Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
radio networks
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
protocol selection
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
cognitive radio
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
radio networks
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
Scalability
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
biblio
Fast Cross Layer Authentication Scheme for Dynamic Wireless Network
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
dynamic wireless communication
dynamic networks
upper layer authentication
upper layer assisted method
static communications
spoofing detection
PLA models
physical layer authentication mechanisms
physical layer authentication
performance stability
network environments
lightweight cross-layer authentication scheme
hypothesis test models
fast cross layer authentication scheme
dynamic wireless network
pubcrawl
dynamic communication scenarios
cross layer authentication
authentication delay
mobile radio
wireless channels
computational complexity
radio networks
composability
Cryptographic Protocols
telecommunication security
message authentication
Resiliency
resilience
Metrics
biblio
Covert Communication by Exploiting Node Multiplicity and Channel Variations
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
error statistics
wireless broadcast networks
superposition coding
Propagation losses
private message
pre-shared secret
noncovert users
noncovert message
node multiplicity
low probability of detection (LPD)
detection probability
detection error probability
channel variation
covert channels
Information hiding
covert communication
pubcrawl
error probability
covert message
broadcast channels
Transmitters
uncertainty
wireless channels
Compositionality
Receivers
radio networks
Wireless communication
Scalability
telecommunication security
Throughput
Resiliency
resilience
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by aekwall on Mon, 12/14/2020 - 12:43pm
dynamic spectrum access
Tsunami
Truthful user Sybil-proof aUctioN mechAnisM
Sybil-proof spectrum auction mechanisms
spectrum shortage problem
spectrum allocation efficiency
single secondary user
sequential matching approach
primary user Sybil-proof aUctioN mechAnisM
online spectrum auction
onlIne spectrum allocation
cost-efficient SUs
bid-independent sorting method
2D truthfulness
Resiliency
Cost accounting
DSA
electronic commerce
Resists
radio networks
Interference
Metrics
Wireless communication
resource management
sybil attacks
composability
pubcrawl
biblio
Machine Learning Based Physical-Layer Intrusion Detection and Location for the Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 2:05pm
security of data
Power cables
power engineering computing
power system security
privacy
pubcrawl
radio networks
resilience
Resiliency
Scalability
policy-based governance
smart grid communication data
smart grid consumer privacy
smart grid data security
Smart Grids
smart power grids
stand-alone solution
Task Analysis
upper layer techniques
Intrusion Detection
carrier transmission on power lines
collaboration
communication purposes
composability
continuous bidirectional information exchange
cryptographic techniques
Human behavior
ideal intruder detection rates
Impedance
active intruder
learning (artificial intelligence)
machine learning
Metrics
modems
network stack
PHY design
physical layer methods
physical-layer intrusion detection
biblio
Analysis of Local Secure Connectivity of Legitimate User in Stochastic Wireless Networks
Submitted by grigby1 on Fri, 11/20/2020 - 1:52pm
secure connection probability
Rayleigh channels
corresponding isolated secure probability
density ratio
eavesdropper collusion
isolated security probability
legitimate user
local secure connectivity
Rayleigh fading
physical layer security
secure wireless communication
secure wireless connection
stochastic networks
stochastic wireless networks
wireless channel conditions
wireless channel fading
Stochastic Computing Security
wireless channels
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Communication system security
radio networks
Receivers
security
wireless networks
Stochastic processes
probability
Monte-Carlo simulation
Monte Carlo methods
Transmitters
fading channels
biblio
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
radio networks
White spaces
volatile operating environment
volatile environment
telecommunication security
security issues
security
Scalability
RL parameters
RL model
resource management
Resiliency
resilience
reinforcement learning model
Reinforcement learning
attacks
pubcrawl
pattern clustering
operating region
network scalability
learning rate
learning (artificial intelligence)
launch attacks
Heuristic algorithms
distributed cognitive radio networks
discount factor
Cognitive Radio Security
cognitive radio
clustering scheme
clustering
biblio
A GUI for Wideband Spectrum Sensing using Compressive Sampling Approaches
Submitted by aekwall on Mon, 09/14/2020 - 12:31pm
Nyquist sampling rates
device communications
effective spectral resource utilization
formidable owing
graphical user interface
graphical user interface (GUI)
measurement vectors
modulated wideband converter
Modulated Wideband Converter (MWC)
multiple measurement vector framework
MWC
newer spectral opportunities
compressive sampling approaches
orthogonal matching pursuit
orthogonal matching pursuit (OMP)
prominent solution
rapidly growing device
SBL approach
Sparse Bayesian Learning (SBL)
Sparse Bayesian Learning algorithms
spectral support
support recovery
wideband spectrum sensing
Wideband
cyber-physical systems
Resiliency
pubcrawl
composability
Iterative methods
privacy
Signal to noise ratio
radio networks
sensors
signal detection
graphical user interfaces
Bayes methods
radio spectrum management
compressed sensing
Matching pursuit algorithms
OMP
GUI
cognitive radio
compressive sampling
signal sampling
signal reconstruction
cognitive radio networks
biblio
High-Throughput Covert Channels in Adaptive Rate Wireless Communication Systems
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
radio networks
link adaptation
low-density parity-check codes
modulation
modulation and coding schemes
modulation coding
multiple MCS rates
parity check codes
pubcrawl
Information hiding
resilience
Resiliency
Scalability
Throughput
underlying communication system
Wireless communication
wireless LAN
wireless local area network modulation
directional multi-Gigabit (DMG)
adaptive rate wireless communication systems
channel capacity
coding schemes
composability
Compositionality
covert channel performance
covert channel throughput
covert channels
adaptation mechanisms
embedding techniques
error statistics
forward error correction
forward error correction-based information hiding technique
generalized information hiding model
high-throughput covert channels
IEEE 802.11ad WLAN
biblio
Poster: rQUIC - integrating FEC with QUIC for robust wireless communications
Submitted by grigby1 on Fri, 06/19/2020 - 11:34am
secure transport protocol
pubcrawl
QUIC
quick UDP Internet connections
radio networks
resilience
Resiliency
robust wireless communications
rQUIC
Propagation losses
security standards
Servers
standards
telecommunication traffic
transport layer
transport protocols
Wireless communication
composability
multiplexed transport protocol
Metrics
Internet traffic
internet
HTTP based applications
forward error correction
FEC
experimental transport protocol
European Tier1-ISP
Error analysis
delays
default end-to-end encryption
Cryptography
connection establishment reduction
computer network security
« first
‹ previous
1
2
3
4
5
6
next ›
last »