Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Wireless communication
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
IP networks
pubcrawl
Resiliency
computer network security
microprocessor chips
wireless sensor networks
intrusion detection system
Wireless communication
composability
telecommunication traffic
multiprocessing systems
DDoS Attacks
Virtual machining
virtual machines
DDoS
resilience
operating systems (computers)
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
Central Processing Unit
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
biblio
An information-theoretic security metric for future wireless communication systems
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
Scalability
telecommunication security
security
Resiliency
Human behavior
pubcrawl
policy-based governance
Wireless communication
Metrics
uncertainty
Entropy
Measurement
radio networks
Security Properties
security performance
wireless communication systems
information theoretic security
Random variables
Abstracts
fine-grained tuning
information theoretic point of view
information theoretic security metric
quantitative analysis
biblio
Wireless Information-Theoretic Security for moving users in autonomic networks
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
security of data
Scalability
Receivers
security
Resiliency
Human behavior
pubcrawl
policy-based governance
Communication system security
Wireless communication
Metrics
Capacity planning
Signal to noise ratio
probability
radio access networks
Transmitters
Rayleigh fading
Physical layer
autonomic networks
low speed mobility
moving users
nonzero secrecy capacity
outage secrecy capacity
secrecy capacity
wireless information theoretic security
Wireless Information-Theoretic Security
information theoretic security
biblio
Network Parameter Analysis; ad hoc WSN for Security Protocol with Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:02pm
Ad hoc networks
ad hoc WSN
Communication system security
Conferences
Cyber Physical System
fuzzy controller
Fuzzy logic
Hidden Markov models
Metrics
mobile devices
Monitoring
network parameter analysis
Protocols
pubcrawl
RAP detection
real-time systems
resilience
Resiliency
Rogue Access Point (RAP)
Rogue Access Point detection
security
security protocol
soft computing prediction tool
telecommunication security
unsecured network
Wireless communication
wireless sensor networks
biblio
Game-Theoretic Approach to Self-Regulation of Dynamic Network Infrastructure to Protect Against Cyber Attacks
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
cyberattack
security of data
Scalability
game theory
information security
Resiliency
pubcrawl
Wireless communication
Mathematical model
Measurement
network structure
Games
Human Factors
Predictive Metrics
Biological system modeling
Nash Equilibrium
game theoretic security
game-theoretic approach
adaptive reconfiguration
computer attacks
cyber attacks protection
dynamic network infrastructure
game theory approach
network games
network reconfiguration
self-regulation
wireless dynamic networks
biblio
Adaptive Flow-Level Scheduling for the IoT MAC
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
access protocols
adaptive flow-level scheduling
Admission control
best-effort scheduling
carrier sense multiple access
clean slate
collaboration
distributed CSMA
distributed MAC protocols
high-density networks
high-speed mobile Internet access
Human behavior
Internet of Things
IoT communications
IoT MAC
IoT-M2M applications
machine-to-machine communication
Metrics
mobile computing
policy-based approach
Protocols
pubcrawl
QoS requirements
quality of service
resilience
Resiliency
Schedules
telecommunication scheduling
WiFi networks
Wireless communication
Wireless fidelity
wireless LAN
wireless MAC
wireless networks
biblio
Deep Learning for Spectrum Anomaly Detection in Cognitive mmWave Radios
Submitted by aekwall on Mon, 03/15/2021 - 12:05pm
Internet of Things
telecommunication security
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Communication system security
Wireless communication
neural nets
Training
Anomaly Detection
probability
telecommunication computing
generative adversarial networks
deep learning
radio spectrum management
Gallium nitride
cognitive radio
deep generative models
AC-GAN
auxiliary classifier generative adversarial network
Cognitive mmWave Radios
Cognitive Radios
complex dynamic radio environment
conditional generative adversarial network
dynamic radio spectrum
Generative Models
Millimeter Wave
Millimeter Wave band
millimetre wave communication
mmWave dataset
mmWave spectrum
secure radios
shared access medium
spectrum anomalies
spectrum anomaly detection
variational auto encoder
Cognitive Radio Security
biblio
Cooperative Spectrum Sensing and Hard Decision Rules for Cognitive Radio Network
Submitted by aekwall on Mon, 03/15/2021 - 12:02pm
Detectors
mobile computing
Resiliency
pubcrawl
Signal to noise ratio
Interference
multi-access systems
cooperative communication
signal detection
AWGN channels
Wireless communication
radio spectrum management
fading channels
cognitive radio
Cognitive Radio Network
unused spectrum
Cognitive Radio Network.
Cooperative Sensing
cooperative spectrum sensing
energy detection
MATLAB Simulink
primary users
recycle licensed spectrum
sense signals
Simulink Energy Detection
spectrum hole
spectrum owners
spectrum sensing
spectrum sensing cognitive radio
unlicensed spectrum
Cognitive Radio Security
biblio
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
security
Receivers
telecommunication security
eavesdropping
Resiliency
pubcrawl
composability
simulation
Communication system security
Wireless communication
Metrics
Decoding
channel coding
Data Transmission
encoding
wireless channels
data security transmission scheme
efficient coding scheme
efficient transmission fountain code
Fountain codes
high efficiency fountain code
intercept probability
legitimate receiver
safe transmission
secure transmission scheme
transmission efficiency
transmitter transmission efficiency
biblio
Augmented Randomness for Secure Key Agreement using Physiological Signals
Submitted by grigby1 on Tue, 03/09/2021 - 3:03pm
Augmented Randomness
BANs
Bio-cryptography
BIOS
biosensors
body area networks
Communication system security
correct key generation rate
cryptographic key generation
Cryptographic Protocols
Cryptography
false key generation rate
generated keys
highly random cryptographic keys
Human behavior
key agreement
lightweight security mechanisms
medical signal processing
Metrics
physiological signals
physiology
predecessor SKA-PS protocol
Protocols
pubcrawl
quantisation (signal)
resilience
Resiliency
Scalability
secure cryptographic key generation
secure key agreement
security
set reconciliation mechanism
SKA-PSAR system
telecommunication security
wearable biosensors
Wireless communication
1
2
3
4
5
6
7
8
9
…
next ›
last »