Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Radio frequency
biblio
Physical-Layer Security of Visible Light Communications with Jamming
Submitted by aekwall on Mon, 07/13/2020 - 11:16am
PLS scheme
Wireless communication
Visual Light Communications Security
visible light communications
visible light communication
uniform distribution
truncated generalized normal distribution
telecommunication security
signal processing
security
secrecy rate
Scalability
Resiliency
Radio frequency
pubcrawl
Entropy
physical-layer security
Photodetectors
normal distribution
multiple eavesdroppers
Metrics
light emitting diodes
jamming LED
Jamming
input signal
indoor VLC system
indoor communication
free-space optical communication
Exponential distribution
biblio
A Practical, Provably Unbreakable Approach to Physical Layer Security
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
reciprocal channel state
Phase measurement
Phase shift keying
phase shift keying constellation
physical layer security
provably unbreakable approach
PSK constellation points
pubcrawl
Radio frequency
radio frequency propagation path
radiowave propagation
raw key bits
multipath fading
resilience
Resiliency
secure key exchange
SNR
static fading channel
telecommunication security
Time measurement
under-determined system
wireless transmission
zero information leakage
independent channel realization
channel coding
channel perturbation
composability
Cryptography
error statistics
Eves antennas
Eves signal-to-noise ratio
fading channel
fading channels
FEC
forward error correction
antennas
independent realizations
key consolidation
key size
linear equations
masking property
measured reciprocal channel phase
Metrics
mirrors
modulo 2π
multipath channel
biblio
Security Aware Spatial Modulation (SA-SM)
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
peak-to-average-power-ratio
forward-error-correction threshold
HN
interchannel interference
Internet-of-Things deployments
MIMO
MIMO communication
MIMO techniques
multiple-input multiple-output techniques
optical transmitters
Peak to average power ratio
degree of technology independent physical layer security
radio range
SA-SM
secure technique
security aware spatial modulation
SM
space division multiplexing
spatial multiplexing
system complexity
visible light range
VLC
error statistics
computer network security
Internet of Things
Receivers
security
Radio frequency
Resiliency
pubcrawl
composability
Metrics
Decoding
IoT
computer network reliability
spectral efficiency
radio receivers
OFDM
forward error correction
adjacent channel interference
arising security concerns
bit-error-rate
communication system capacity
communication system reliability
biblio
Criteria for Determining Maximum Theoretical Oscillating Frequency of Extended Interaction Oscillators for Terahertz Applications
Submitted by grigby1 on Fri, 04/24/2020 - 4:09pm
Resonant frequency
O-type microwave tubes
one ring-loaded waveguide
oscillating behaviors
Oscillators
privacy
pubcrawl
Radio frequency
resilience
Resiliency
millimeter-wave radiations
sheet electron beam
slow wave structures
slow-wave structure
specified EIO geometry
terahertz (THz) sources
terahertz applications
terahertz radiations
vacuum microelectronics
waveguides
extended interaction oscillators
beam geometries
Cavity resonators
composability
Conductivity
critical unloaded oscillating frequency
current density
cylindrical beam
double-ridge slow-wave structures
electron beams
2π standing-wave modes
Extended interaction oscillators (EIOs)
Geometry
high-frequency behavior
high-frequency vacuum-electronic source
high-power submillimeter wavelengths
load-lines
maximum theoretical oscillating frequency
Metrics
millimeter-wave
biblio
On the Physical Layer Security of a Regenerative Relay-Based mixed RF/UOWC
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
fading channels
Underwater Networks
selection-combining
regenerative relay-based mixed RF/UOWC
Rayleigh fading
one-antenna source node
multiantenna DF relay node
mixture Exponential-Gamma fading
dual-hop decode-and-forward mixed radio-frequency/underwater optical wireless communication system
decode and forward communication
closed-form expression
underwater optical wireless communication
secrecy outage probability
optical fiber communication
Scalability
diversity reception
relay networks (telecommunication)
Relays
physical layer security
probability
Signal to noise ratio
Metrics
Wireless communication
pubcrawl
Resiliency
Radio frequency
security
telecommunication security
biblio
Physical Layer Security of an Amplify-and-Forward Energy Harvesting-Based Mixed RF/UOW System
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
optical fiber communication
fixed-gain amplification
legitimate destination node
malicious eavesdropper
maximal ratio combining
mixed RF-UOWC system
mixture Exponential-Gamma fading
MRC
multiantenna AF relay device
Nakagami channels
Nakagami-m fading
fading channels
optical links
radio-frequency system
relay node
RF link
S-R hop
secrecy outage probability
single-antenna source node
underwater optical wireless communication
UOWC link
Underwater Networks
error statistics
telecommunication security
Radio frequency
Resiliency
pubcrawl
batteries
wireless sensor networks
telecommunication power management
Metrics
Signal to noise ratio
probability
Scalability
antenna arrays
physical layer security
Relays
relay networks (telecommunication)
telecommunication network reliability
amplify and forward communication
amplify-and-forward energy harvesting
diversity reception
dual-hop system
energy harvesting
biblio
IoT Devices Security Using RF Fingerprinting
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
software defined radio
Radio frequency
Radio Frequency Fingerprinting
RF Fingerprinting
Scalability
scalability problems
SDR
security
security scalability
smart devices
pubcrawl
software radio
telecommunication security
Telecommunication standards
universal SDR-based inexpensive implementation
user-dedicated modes
Wireless communication
wireless RFF
wireless security authentication
feature extraction
authentication problem
Compositionality
computational complexity
computer network security
Cryptographic Protocols
cryptography-based authentication protocols
device identity fingerprint
emitted wireless signals
authentication
Fingerprint recognition
Internet of Things
Internet of Things devices industry
IoT
IoT devices security
mobile phone signal burst extraction
Object recognition
physical layer-based security authentication method
biblio
Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
Internet of Things systems
symmetric-key algorithm
simple round function
security attacks
security and performance analysis
Scalability
Resiliency
Radio frequency
pubcrawl
plaintext messages
Lightweight flexible key dependent cipher scheme
lightweight cryptographic algorithms
Lightweight Ciphers
lightweight cipher scheme
IoT systems
IoT devices
cipher variants
Internet of Things
input message
Heuristic algorithms
flexible lightweight cipher
flexible cipher scheme
dynamic Operation mode
dynamic key approach
dynamic cryptographic primitives
data confidentiality
Cryptography
confidentiality attacks
Conferences
computer network security
Ciphers
biblio
An Elaborate Comprehensive Survey on Recent Developments in Behaviour Based Intrusion Detection Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
Intrusion Detection
telecommunication traffic
survey
security of data
Resiliency
Radio frequency
pubcrawl
network activity
intrusion detection technology
Intrusion Detection Systems
Artificial Neural Networks
intrusion
IDS
detection
data monitoring
composability
Cloud Computing
Classification algorithms
behaviour based intrusion detection systems
behavior
biblio
Secure Sensor Design for Resiliency of Control Systems Prior to Attack Detection
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
Markov processes
stochastic systems
stochastic control systems
stochastic control scenarios
sensor outputs
security of data
secure sensor design
Scalability
Resiliency
resilience
Random variables
Radio frequency
pubcrawl
process control
possible attacks
Attack detection
Human behavior
Gaussian processes
Games
game theory
Detectability
defense mechanism
cyber physical systems
Cyber Physical System
Cost function
controlled Gauss-Markov process
Control Theory
control systems
control objectives
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »