Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
eavesdropping
biblio
Eavesdropping Against Bidirectional Physical Layer Secret Key Generation in Fiber Communications
Submitted by grigby1 on Fri, 03/17/2023 - 10:36am
pubcrawl
Human behavior
Human Factors
Metrics
Scalability
Cryptography
resilience
physical layer security
eavesdropping
Physical layer
Photonics
optical fiber communication
Resiliency
random key generation
fiber communications
two-way secret key generation
biblio
A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels
Submitted by aekwall on Sun, 10/16/2022 - 5:03pm
Interference
game theoretic security
wireless communication network
security game
Pricing
channel capacity
Bayesian equilibrium
cooperative jamming
eavesdropping
Human Factors
Predictive Metrics
Probabilistic logic
Receivers
Scalability
pubcrawl
Wireless communication
Games
biblio
Forensic Analysis of Automotive Controller Area Network Emissions for Problem Resolution
Submitted by aekwall on Fri, 08/26/2022 - 10:57am
Forensics
vehicle
emissions
EMI
electromagnetic compatibility
eavesdropping
fault diagnosis
Magnetic field measurement
Cybersecurity
electromagnetic interference
pubcrawl
cyber-physical systems
controller area network security
CAN
automotive
controller area network
telecommunication traffic
computer security
Internet of Things
Resiliency
biblio
Lightweight Encryption Using Chaffing and Winnowing with All-or-Nothing Transform for Network-on-Chip Architectures
Submitted by grigby1 on Tue, 03/01/2022 - 3:18pm
composability
eavesdropping
encryption
Hardware
intellectual property
Metrics
network on chip security
network-on-chip
pubcrawl
resilience
Resiliency
Scalability
security
system-on-chip
Transforms
biblio
The Strategy of Beating the Intermediate Basis Attack in Quantum Communication Networks
Submitted by aekwall on Mon, 11/29/2021 - 1:28pm
Protocols
pubcrawl
composability
Compositionality
eavesdropping
Bit error rate
Photonics
Quantum bit error rate
Quantum communication networks
quantum cryptography
WNl9 strategy
theoretical cryptography
biblio
When AI Gossips
Submitted by grigby1 on Tue, 10/12/2021 - 3:21pm
Metrics
standards
Stakeholders
social media
Scalability
Risk
pubcrawl
Privacy Policies
privacy
nudging
AI
Measurement
human rights
Human behavior
harm
Guidelines
gossip
eavesdropping
Artificial Intelligence
biblio
Safeguarding Backscatter RFID Communication against Proactive Eavesdropping
Submitted by grigby1 on Thu, 09/16/2021 - 1:13pm
pubcrawl
security
RFIDs
RFID
resource management
Resiliency
resilience
radiofrequency identification
Radio frequency identification (RFID)
radio frequency identification
artificial noise
proactive eavesdropping
physical layer security
optimization.
optimization
Human behavior
Games
eavesdropping
Backscatter communication
backscatter
biblio
Security of Satellite-Based CV-QKD under Realistic Assumptions
Submitted by grigby1 on Tue, 08/31/2021 - 12:12pm
quantum computing
security
pubcrawl
Apertures
eavesdropping
Photonics
Quantum Key Distribution
Receivers
satellite-based communication
Satellites
Scalability
biblio
Physical-Layer Cooperative Key Generation with Correlated Eavesdropping Channels in IoT
Submitted by grigby1 on Tue, 08/31/2021 - 11:08am
Metrics
wireless sensor networks
security
Scalability
Resiliency
resilience
Relays
random key generation
pubcrawl
physical layer security
partially colluding eavesdroppers
theoretical cryptography
key rate
key generation
Internet of Things
Human behavior
eavesdropping
Correlation
correlated eavesdropping channels
Channel estimation
Compositionality
composability
biblio
Achieving one-time pad via endogenous secret keys in wireless communication
Submitted by aekwall on Tue, 08/17/2021 - 3:16pm
key management
the one-time pad
Signal to noise ratio
secret key generation
resource management
physical layer security
Endogenous security
eavesdropping
Binary phase shift keying
security
Communication system security
Human behavior
Resiliency
Metrics
pubcrawl
Wireless communication
Scalability
1
2
3
4
next ›
last »