Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
eavesdropper
biblio
Blockchain-enabled FD-NOMA based Vehicular Network with Physical Layer Security
Submitted by grigby1 on Fri, 02/03/2023 - 3:38pm
simulation
secrecy rate
goodput
FD-NOMA
data rate.
blockchains
Vehicular and wireless technologies
eavesdropper
physical layer security
security
Reliability
blockchain
composability
5G mobile communication
Resiliency
resilience
Metrics
pubcrawl
biblio
Physical Layer Security in Frequency-Domain Time-Reversal SISO OFDM Communication
Submitted by aekwall on Mon, 11/08/2021 - 3:28pm
security
pubcrawl
Scalability
Resiliency
Predictive Metrics
artificial noise
eavesdropper
physical layer security
secrecy rate
SISO-OFDM
time-reversal
Time Frequency Analysis and Security
biblio
Information-theoretic security in wireless multicasting
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
multicast communication
wireless multicasting
transmission rate
secrecy multicast mutual information
quasistatic Rayleigh fading channel
nonzero secrecy
Multicasting
multicast mutual information
informationtheoretic security
information theoretic formulation
eavesdropper's channel
client receiver
analytical expression
outage probability
information theoretic security
transmitter
security of data
Rayleigh fading
radio receivers
radio transmitters
Rayleigh channels
eavesdropper
probability
Phasor measurement units
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
telecommunication security
Scalability
biblio
Neural Network Wiretap Code Design for Multi-Mode Fiber Optical Channels
Submitted by aekwall on Mon, 03/15/2021 - 11:55am
optical receivers
wiretap code
polar wiretap codes
Pareto improvement
neural network wiretap code design
mutual information leakage
multimode fiber wiretap channel
multimode fiber optical channel
multi-mode fiber
industrial machine type communication
finite blocklength
finite block length
fading channel
AWGN channel
Pareto optimisation
autoencoder
telecommunication security
telecommunication network reliability
secure code
polar codes
AWGN channels
physical layer security
eavesdropper
telecommunication computing
optical fibre networks
channel coding
neural nets
Metrics
composability
pubcrawl
Resiliency
biblio
Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
delay-optimal M-link codes
telecommunication security
synchronisation
streaming code
streaming applications
source symbol
security
secure transmission
resilience
pubcrawl
parallel burst erasure channels
low delay
eavesdropper
channel coding
delay-optimal coding
decoding delay constraint
Decoding
Cryptography
Compositionality
coding theory
code parameters
channel model
burst erasure multiple-link code
composability
Resiliency
Metrics
biblio
Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain- Texts
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
common-key cryptographic communication
brute force attacks
Software algorithms
security improvement
legal plaintext
fundamental methods
fake plaintexts
fake plain-texts
decryption keys
cryptogram
concrete encryption-decryption algorithm
common-key cryptosystem
encryption
Common Key Cryptosystem
Brute Force Attack
policy-based governance
Human Factors
Computers
Law
eavesdropper
collaboration
pubcrawl
public key cryptography
telecommunication security
biblio
Secrecy Rate Analysis for Visible Light Communications Using Spatial Modulation
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
System performance
receiver
Resiliency
Scalability
secrecy performance
secrecy rate
secrecy rate analysis
SM based VLC
spatial modulation
spatial modulation scheme
pubcrawl
telecommunication security
Telecommunications
uniform selection
upper bounds
US scheme
visible light communication
visible light communications
Visual Light Communications Security
light emitting diodes
CAS scheme
channel adaptive selection scheme
derived secrecy rate bounds
dimmable average optical intensity constraints
eavesdropper
free-space optical communication
indoor communication
indoor VLC system
information theory
active transmitter
lower bounds
Metrics
modulation
multiple transmitters
optical modulation
optical receivers
optical transmitters
physical layer security
biblio
Quantum Low Probability of Intercept
Submitted by grigby1 on Fri, 06/19/2020 - 11:34am
Metropolitan area networks
telecommunication security
Resiliency
resilience
Receivers
quantum low probability of intercept
pubcrawl
probability
Photonics
optical fibre networks
optical fiber
OCIS codes
Monitoring
metropolitan-area distances
(060.1660) Coherent communications
Metrics
forward error correction
error probability
eavesdropping
eavesdropper
decryption key
Cryptography
composability
Ciphertext
Brightness
(270.5568) Quantum cryptography
(270.5565) Quantum communications
biblio
Information Theoretic Security over α-µ/α-µ Composite Multipath Fading Channel
Submitted by grigby1 on Tue, 06/02/2020 - 11:53am
secrecy matrices
policy-based governance
probability
pubcrawl
Receivers
resilience
Resiliency
Scalability
secrecy
non-zero secrecy capacity
secure outage probability
security
shadowing
Signal to noise ratio
telecommunication security
wireless channel
Wireless communication
α-μ distribution
Human Factors
channel capacity
channel parameters
Communication system security
composite multipath fading channel
confidential information
eavesdropper
fading channels
Human behavior
Capacity planning
Information Leakage
information theoretic security
mathematical expressions
Metrics
Monte Carlo methods
Monte-Carlo simulations
multipath channels
multipath fading
biblio
A Secure Network Coding System Against Wiretap Attacks
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
passive attacks
wiretap attacks
wiretap attack
wireless networks
wired networks
weak security
secure network coding system architecture
Routing
Resiliency
resilience
Receivers
random network coding system
random codes
pubcrawl
communication confidentiality
network performance metrics
network links
network coding
Metrics
Hash functions
encoding
eavesdropper
deterministic network coding system
cyber security
cyber physical systems
Cryptography
composability
1
2
3
next ›
last »