Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
wireless sensor networks
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 1:47pm
Support vector machines
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
wireless sensor networks
composability
telecommunication computing
sensors
Denial of Service attacks
Floods
service attacks
Classification algorithms
neural nets
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
smart appliances
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
biblio
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 12:35pm
security of data
computer network security
IP networks
Scalability
telecommunication traffic
telecommunication security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
internet
telecommunication network routing
delays
telecommunication network topology
named data networking
Resists
Data Transmission
computer science
DoS attacks
UWSN
underwater acoustic communication
network architecture
denial-of-service attack
Denial-of-Service
denial-of-service attacks
attacker identification
attackers synergize
future network architectures
increased network traffic
Interest Flooding Attack
interest flooding attacks
normal IFAs
SDoS attacks
Synergetic Denial-of-Service
underwater sensor networks
biblio
DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks
Submitted by aekwall on Mon, 02/15/2021 - 3:48pm
Aggregation
composability
computational geometry
Cryptographic Protocols
Cryptography
cyber physical systems
data aggregation
data communication
data encryption
DEAVD protocol compresses data
decryption
Decryption Technique
efficient encryption
encryption
energy conservation
energy consumption
energy efficient encryption
environmental monitoring
military surveillance
Protocols
providing security
pubcrawl
Resiliency
secure data exchange
sensed data
Voronoi diagram
voronoi diagram paradigm
wireless sensor networks
biblio
Organisation and Implementation of ResNet Face Recognition Architectures in the Environment of Zigbee-based Data Transmission Protocol
Submitted by grigby1 on Thu, 01/28/2021 - 12:34pm
android encryption
Arduino
Cameras
computer architecture
face recognition
Human behavior
IEEE 802.15.4
Metrics
Protocols
pubcrawl
Raspberry Pi
resilience
Resiliency
ResNet
Scalability
Task Analysis
Wireless fidelity
wireless sensor networks
Zigbee
biblio
A survey on Symmetric and Asymmetric Key based Image Encryption
Submitted by aekwall on Mon, 01/25/2021 - 11:56am
Cryptography
encryption
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Metrics
Image coding
authenticity
Image Processing
decryption
Asymmetric Encryption
Asymmetric
asymmetric key
cipher text
different transfer mediums
encryption algorithms
encryption approaches
era security
image destruction
image encryption techniques
symmetric
technological advancements especially wireless sensor network
biblio
Behavior Modeling and Individual Recognition of Sonar Transmitter for Secure Communication in UASNs
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
Acoustic Fingerprints
Analytical models
behavior modeling
Class D power amplifier
composability
Computational modeling
feature extraction
fingerprint features
Human behavior
individual recognition
low-frequency radiation source
memory polynomial model
nonlinear model
power amplifier
power spectrum features
pubcrawl
radio frequency fingerprint
radio transmitters
received signal
resilience
Resiliency
secure communication
Sonar
Sonar equipment
sonar signal processing
sonar transmitter
specific emitter identification
specific emitter recognition
UASN
underwater acoustic communication
underwater acoustic sensor networks
Underwater vehicles
wireless sensor networks
biblio
Acoustic Fingerprints for Access Management in Ad-Hoc Sensor Networks
Submitted by grigby1 on Wed, 01/20/2021 - 3:07pm
access management system
Acoustic Fingerprints
acoustic scenery
Acoustic signal processing
Acoustics
Ad hoc networks
ad-hoc sensor networks
audio fingerprint
Audio fingerprinting
audio quality
audio signal processing
authentication
composability
context based authentication
Cryptography
distributed voice user interface
fuzzy cryptography yields
Human behavior
intuitive interaction
microphones
multiple devices
performance evaluation
pubcrawl
resilience
Resiliency
robust generation
robust pairing
Robustness
speech processing
unauthorized devices
user interfaces
users
voice communication
Voice User Interface
voice user interfaces
wireless sensor networks
biblio
LA-ANA based Architecture for Bluetooth Environment
Submitted by grigby1 on Mon, 12/28/2020 - 11:29am
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Throughput
Mathematical model
wireless sensor networks
composability
telecommunication congestion control
fault tolerance
Fault tolerant systems
multicast communication
bluetooth security
autonomic network
Autonomic Network Architecture (ANA)
Bluetooth based dynamic environment
Bluetooth environment
dynamic environment
LA-ANA based architecture
LACAS
LACAS based wireless sensor network
multicast packet delivery
multiple sensor node technology
Piconet
stochastic model
unicast packet delivery
Wireless Personal Area Network
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
address randomization
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
BT spectrum analysis
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
high data rates
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
resilience
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
biblio
Wireless Interrogation of High Temperature Surface Acoustic Wave Dynamic Strain Sensor
Submitted by aekwall on Mon, 12/21/2020 - 12:32pm
Scalability
Resiliency
Human behavior
pubcrawl
wireless sensor networks
Wireless communication
condition monitoring
sensors
data acquisition
wireless
acoustic wave
surface acoustic wave resonators
surface acoustic wave sensors
acoustic coupling
Temperature sensors
temperature 293.0 K to 298.0 K
temperature 25.0 degC
Aerodynamics
Bragg gratings
Condition-based Maintenance
dynamic strain excitation
dynamic strain sensing
dynamic strain sensor
fibre optic sensors
frequency 288.8 MHz
high temperature surface acoustic wave dynamic strain sensor
high-temperature harsh-environment applications
high-temperature harsh-environment sensor
high-temperature wired commercial strain gauge
monitoring dynamic strain
room temperature
SAWR dynamic strain sensors
sensor connection
sensor stability
Strain
strain gauges
strain measurement
strain sensors
structural engineering
structural health monitoring
temperature 100.0 degC
temperature 1000.0 degC
temperature 400.0 degC
wireless interrogation
wireless sensor operation
wirelessly interrogated SAWRs
1
2
3
4
5
6
7
8
9
…
next ›
last »