Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security
biblio
Compressive Sensing and Hyper-Chaos Based Image Compression-Encryption
Submitted by
grigby1
on Tue, 12/10/2019 - 10:21am
2D-Compressive Sensing
chaos
chaos based measurement matrix construction
chaotic communication
cipher image
composability
compressed sensing
Compression
compression-encryption algorithm
compressive sampling
compressive sensing
Cryptography
Cyber Physical System
cyber physical systems
data compression
encryption
Hyper-chaos
hyper-chaos based diffusion
hyper-chaos based image compression-encryption algorithm
Image coding
Image reconstruction
linear measurements
Logistics
matrix algebra
privacy
pubcrawl
resilience
Resiliency
security
sparse coefficients
Sparse matrices
Two dimensional displays
biblio
Improving the Efficiency of IDPS by Using Hybrid Methods from Artificial Intelligence
Submitted by
grigby1
on Mon, 12/09/2019 - 1:01pm
Artificial Intelligence
composability
Compositionality
computational intelligence
Computational modeling
computer network security
computer networks security
Cryptography
cyber defense
Fuzzy logic
hybrid methods
intrusion detection system
Intrusion Detection Systems
intrusion prevention system
IP networks
Monitoring
multi-agent systems
multiagent systems
network and information security
optimization
pubcrawl
Reinforcement learning
security
biblio
Computational Intelligence in Maritime Security and Defense: Challenges and Opportunities
Submitted by
grigby1
on Mon, 12/09/2019 - 1:01pm
Artificial Intelligence
CI techniques
composability
Compositionality
computational intelligence
Cryptography
evolutionary computation
groupware
knowledge based systems
maritime domain
military computing
NATO Nations
neural nets
Oceans
pubcrawl
review CI applications
security
Security & Defense applications
simulated annealing
Training
biblio
Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks
Submitted by
aekwall
on Mon, 12/09/2019 - 11:24am
security
pubcrawl
composability
wireless sensor networks
trust
self-healing
Compositionality
Computing Theory and Trust
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by
aekwall
on Mon, 12/09/2019 - 11:24am
security
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
Computational modeling
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
cluster formation game
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
illegitimate sensor nodes
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
biblio
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion
Submitted by
aekwall
on Mon, 12/09/2019 - 11:22am
security of data
Cloud Computing
Internet of Things
security
Trusted Computing
pubcrawl
composability
Computational modeling
Reliability
Entropy
sensor fusion
edge computing
Compositionality
outsourcing
Computational efficiency
feedback information fusion algorithm
feedback trust
global trust calculation
information entropy
IoT edge computing applications
IoT edge computing architecture
IoT edge devices
largescale IoT edge computing
lightweight trust computing mechanism
lightweight trust evaluating mechanism
lightweight trust mechanism
low-overhead trust computing algorithms
multi-source feedback information fusion
multisource feedback information fusion
objective information entropy theory
outsourced computing services
reliable trust computing mechanism
trust calculation mechanism
trust computing mechanism
Computing Theory and Trust
biblio
Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
Submitted by
grigby1
on Thu, 12/05/2019 - 9:56am
cognitive radio
Cognitive Radio Security
diversity reception
Maximum ratio combining
maximum ratio combining scheme
MRC scheme
overlay cognitive wireless networks
physical layer security
power system reliability
primary transmission security
primary user information secrecy performance
primary user information security
probability
programmable logic arrays
pubcrawl
radio transmitters
relay links
Relays
resilience
Resiliency
secondary cooperative node
secrecy outage probability
security
Security analysis
Signal to noise ratio
SOP
source information
telecommunication security
tight lower bound expression
transmission secrecy performance
transmit power
untrusted energy-limited secondary cooperative user
untrusted relaying
untrusted secondary user
wireless networks
biblio
The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-Hoc Networks
Submitted by
grigby1
on Thu, 12/05/2019 - 9:55am
Ad hoc networks
attack-proof cooperative spectrum sensing
byzantine attack
byzantine attack mitigation scheme
Cascading style sheets
cognitive radio
cognitive radio ad-hoc networks
Cognitive Radio Security
Consensus algorithm
cooperative communication
data communications
Interference
legitimate cognitive radios
network leading interference
pubcrawl
Radio spectrum
radio spectrum management
radio spectrums
resilience
Resiliency
security
security measure
sensors
signal detection
spectrum bands
spectrum congestion
telecommunication security
underutilized spectrum
wireless network systems
biblio
Analogous Study of Security Threats in Cognitive Radio
Submitted by
grigby1
on Thu, 12/05/2019 - 9:55am
cognitive radio
Cognitive Radio (CR)
Cognitive Radio Security
cognitive radio wireless sensor networks
cooperative communication
cooperative spectrum sensing
Cooperative Spectrum Sensing and Spectrum Sensing Data Falsification (SSDF)
CRWSN
Data integration
Electromagnetic spectrum
electromagnetic spectrum band
fusion technique
Fusion Techniques
Interference
Jamming
Primary user Emulation
pubcrawl
PUE
radio spectrum management
resilience
Resiliency
security
sensor fusion
sensors
signal detection
spectrum sensing data falsification
SSDF
telecommunication security
white space
Wireless communication
wireless security threat issue
wireless sensor networks
biblio
Securing Named Data Networks: Challenges and the Way Forward
Submitted by
grigby1
on Thu, 12/05/2019 - 9:53am
Access Control
clean slate
collaboration
confidentiality
edge computing
Human behavior
Human Factors
integrity
Metrics
named data networks
Policy
Policy Based Governance
policy governance
privacy
pubcrawl
resilience
Resiliency
security
1
2
3
4
5
6
7
8
9
…
next ›
last »