Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
eavesdropper
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Frozen Bit Selection Scheme for Polar Coding Combined with Physical Layer Security
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
Metrics
wiretap channel
telecommunication security
symmetric α-stable distribution
security
secrecy rate
Resiliency
resilience
Receivers
pubcrawl
Protocols
polar coding scheme
polar codes
physical layer security
channel coding
legitimate users
impulsive noise
frozen bit selection scheme
frozen bit
error statistics
eavesdropper
density evolution
Decoding
composability
bit-error rate
BER
Automatic repeat request
ARQ protocol
biblio
Covert Communication Under Channel Uncertainty and Noise Uncertainty
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
low probability of detection communication
user privacy protection
uncertainty
Throughput
telecommunication security
signal transmission
Signal to noise ratio
Scalability
resilience
receive SNR
Rayleigh fading channel
Rayleigh channels
Probability density function
noise uncertainty
noise power
average probability
Gain
fading channels
error statistics
eavesdropper
Data protection
covert throughput loss
covert throughput gain
covert communication
covert channels
Compositionality
channel uncertainty
channel gain
Channel estimation
average probability of detection error
biblio
Ghostbuster: Detecting the Presence of Hidden Eavesdroppers
Submitted by aekwall on Mon, 08/26/2019 - 10:08am
resilience
wireless
security weaknesses
eavesdropper
Metrics
policy-based governance
pubcrawl
Human behavior
security
biblio
A filter selection based physical layer security system
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
filter design
signal processing security
USRP
software radio
RRC
root raised cosine filters
Roll of factor
radio networks
physical layer security system
physical layer security method
physical layer security
Physical layer
filtering theory
filter selection
network security
EVM
eavesdropping attacks
eavesdropper
Signal to noise ratio
Metrics
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
telecommunication security
Receivers
Conferences
biblio
High Security Orthogonal Factorized Channel Scrambling Scheme with Location Information Embedded for MIMO-Based VLC System
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Scalability
OFCS-LIE
OFCS-LIE scheme
optical transmitters
orthogonal error
physical layer security
pubcrawl
Receivers
Reliability
resilience
Resiliency
resultant OFCS-LIE matrix
multiple-output channels
secrecy capacity
security
system security
system security analysis
telecommunication security
visible light beam
Visible Light Communications Security
visible light communication system confidentiality
visible light communication system privacy
wireless channels
Iterative methods
channel capacity
counterpart scrambling scheme
Cryptography
eavesdropper
free-space optical communication
high security orthogonal factorized channel scrambling scheme
Information Leakage
information transmission reliability
information transmission security
iteration number
Adaptive optics
iterative orthogonal factorization method
LIE matrix factorization
light emitting diodes
location information embedded matrix
Matrix decomposition
Metrics
MIMO-based VLC system
MIMO channels
MIMO communication
multiple-input
biblio
Physical layer security using BCH and LDPC codes with adaptive granular HARQ
Submitted by grigby1 on Fri, 10/26/2018 - 4:51pm
reliable transmission
LDPC codes
legitimate channel
legitimate receiver
legitimate recipient request
parity check codes
physical layer security
pubcrawl
received symbols likelihood computations
Receivers
Reliability
intended receiver
Resiliency
retransmitted packets
Scalability
secure transmission
security
Signal to noise ratio
telecommunication security
transmission techniques
wireless communications systems
decoding process
additive noise Gaussian wiretap channel
Automatic repeat request
BCH codes
better channel conditions
channel capacity
channel codes
channel coding
coded packets
Conferences
Decoding
adaptive granular HARQ
eavesdropper
equal channel conditions
error correction codes
error statistics
feedback transmitted packets
forward error correction
granular subpackets
HARQ retransmission requests
hybrid automatic repeat-request protocol
biblio
Implementing a real-time capable WPLS testbed for independent performance and security analyses
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
security
personal area networks
physical layer security
pubcrawl
real-time capable WPLS testbed
real-time systems
resilience
Resiliency
secret key rate estimation
Particle measurements
security analyses
security evaluations
telecommunication security
Wireless communication
Wireless Physical Layer Security
wireless sensor networks
WPLS research results
8-bit MCU 8051
off-the-shelf hardware
microcontrollers
Metrics
legitimate parties
key management
key extraction
Internet of Things
independent performance
IEEE 802.15.4 communication standard
generically multiple transceivers
Entropy
eavesdropper
Correlation
composability
Atmospheric measurements
biblio
On Protecting Location Secrecy
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
LSM
wireless localization network
Wireless communication
telecommunication security
Scalability
Resiliency
resilience
pubcrawl
privacy
Position measurement
Particle measurements
mobility management (mobile radio)
Metrics
Adversary Models
location secrecy metric
Location secrecy
location information
localization process
localization
Human behavior
general measurement model
eavesdropper
Communication system security
channel conditions
Atmospheric measurements
Algorithm design and analysis
biblio
Individually-Secure Multi-Source Multicast
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
network links
zero mutual information
telecommunication security
SMSM
security
secure MSM
Resiliency
resilience
Reliability
rate region
pubcrawl
nonsecure MSM
network topology
coding theory
network coding
Mutual information
multicast communication
Metrics
individually-secure multisource multicast
encoding
eavesdropper
cut-set bound
Cryptography
Compositionality
common secure model
« first
‹ previous
1
2
3
next ›
last »