Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
biblio
Improving the security of internet of things using encryption algorithms
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
Metrics
Software algorithms
smart devices
Security of internet of things
safety risks
Resiliency
Receivers
Radio frequency identification (RFID)
Public key
pubcrawl
privacy
advanced information technology
IoT security
Internet of Things
hybrid encryption algorithm
Hybrid algorithm
Human Factors
Human behavior
encryption
digital signatures
Cryptography
composability
biblio
Raising flags: Detecting covert storage channels using relative entropy
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
TCP flag frequency distribution
Receivers
regular traffic data sets
regular traffic packets
relative entropy
Resiliency
ROC curves
Scalability
secret messages
receiver operating characteristic
TCP flag header
TCP/IP network packets
telecommunication traffic
testing
timing
transport protocols
Unix systems
IP addresses
coding schemes
Compositionality
covert channels
covert storage channel
covert storage channels
CSC messages
encoding
Entropy
Anomaly Detection
IP networks
IP pair
network traffic
normal traffic
Protocols
pubcrawl
raising flags
biblio
Covert communication with noncausal channel-state information at the transmitter
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
pubcrawl
Transmitters
transmitter
state-dependent channel
Scalability
Resiliency
Reliability
Receivers
radio transmitters
additive white Gaussian noise channels
noncausal channel-state information
Monte Carlo methods
encoding
discrete memoryless channels
covert communication
covert channels
Compositionality
AWGN channels
biblio
Covert Communication in Fading Channels under Channel Uncertainty
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
Compositionality
covert channels
Detectors
fading channels
pubcrawl
Radiometry
Receivers
Resiliency
Scalability
uncertainty
Wireless communication
biblio
Review of covert channels over HTTP: Communication and countermeasures
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
message content confidentiality
Uniform resource locators
ubiquitous HTTP message
transport protocols
timing
Technological innovation
Servers
Scalability
Resiliency
Receivers
pubcrawl
Protocols
networks
Browsers
internet
HTTP
detection
data leakage
Cryptography
Cryptographic Protocols
covert information container
covert communication method
covert channels
covert channel
Compositionality
capacity
biblio
Detecting Covert Channels in FPS Online Games
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
Companies
Compositionality
covert channels
encoding
Entropy
Games
Online Games
pubcrawl
Receivers
Resiliency
Scalability
Servers
Training
biblio
Research on the Underlying Method of Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
elliptic curve
Elliptic curve cryptography
Elliptic Curve Cryptosystem
Elliptic curves
finite field
Galois fields
generator
Generators
group
Metrics
pubcrawl
Receivers
Resiliency
Scalability
biblio
Two-way real time multimedia stream authentication using physical unclonable functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:04pm
Multimedia Signal Processing
Xilinx
video surveillance
telecommunication security
Streaming media
signal processing
Resiliency
Receivers
real-time systems
pubcrawl
physical unclonable functions
multimedia stream authentication
authentication
Multimedia communication
Metrics
media streaming
license/key management
Human Factors
Human behavior
hardware-based security
Hardware
FPGA
Digital rights management
biblio
A fair exchange and track system for RFID-tagged logistic chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
radiofrequency identification
verifiably encrypted signature
telecommunication security
supply chains
Supply Chain
RFID tags
RFID tagged supply chains
RFID tagged logistic chains
RFID
Receivers
cryptographic attestation
radio receivers
radio frequency identification
pubcrawl170112
Protocols
logistics operations
Iron
fair exchange techniques
fair exchange
Cryptography
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »