Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
radio networks
biblio
Fault Tolerance and Security in Forwarding Packets Using Game Theory
Submitted by aekwall on Mon, 12/30/2019 - 11:25am
price of anarchy
wireless sensor networks
wireless networks
wireless mesh networks
Waste materials
telecommunication security
telecommunication network reliability
self organized wireless network
security
Scalability
Relays
radio networks
pubcrawl
Ad hoc networks
Predictive Metrics
Nash Equilibrium
Mesh networks
Human Factors
game theory
game theoretic security
forwarding packet security
forwarding packet fault tolerance
fault tolerance
cooperation strategy
cooperation stimulation
biblio
Primary User Authentication in Cognitive Radio Network Using Pre-Generated Hash Digest
Submitted by grigby1 on Thu, 12/05/2019 - 9:56am
pregenerated hash digest
telecommunication security
sensors
Resiliency
resilience
radio networks
PUEA
pubcrawl
primary user emulation attack
primary user authentication
authentication
node authentication
emulation
Cryptography
CRN
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
Base stations
biblio
Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks
Submitted by grigby1 on Thu, 12/05/2019 - 9:52am
resilience
neural nets
Neural networks
optimal MAC strategy
Policy
Policy Based Governance
policy governance
prior knowledge
pubcrawl
radio networks
network layers
Resiliency
Robustness
share spectrum
telecommunication computing
time division multiple access
time-slotted networks
traditional reinforcement learning
universal MAC protocol
wireless networks
DRL algorithmic framework
clean-slate design
collaboration
convergence
DARPA SC2
deep reinforcement learning
deep-reinforcement learning multiple access
design framework
DLMA
DRL agent
clean slate
heterogeneous wireless networks
Human behavior
Human Factors
learning (artificial intelligence)
MAC design
machine learning
machine-learning technique
Media Access Protocol
Metrics
biblio
A filter selection based physical layer security system
Submitted by aekwall on Mon, 03/25/2019 - 8:58am
filter design
signal processing security
USRP
software radio
RRC
root raised cosine filters
Roll of factor
radio networks
physical layer security system
physical layer security method
physical layer security
Physical layer
filtering theory
filter selection
network security
EVM
eavesdropping attacks
eavesdropper
Signal to noise ratio
Metrics
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
telecommunication security
Receivers
Conferences
biblio
Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
radio networks
hidden Markov model
HMM
key extraction security analysis
legitimate wireless devices
multiple adversaries algorithm
OME algorithm
physical measurements
private communication
Heuristic algorithms
secret key extraction scheme
security evaluation metric
SOME algorithm
suboptimal method-with-multiple adversaries
Viterbi algorithm
wireless channels
wiretap channel model
Adversary Models
telecommunication security
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hidden Markov models
computational complexity
Wireless communication
security
Communication system security
Entropy
approximate conditional min- entropy
Channel models
computation complexity reduction
dynamic programming
dynamic programming approach
exponential computation complexity
biblio
Internet of Radio Light: Unleashing Innovation in Building Networks
Submitted by grigby1 on Mon, 11/19/2018 - 11:34am
light interference
wireless networks
Visible Light Communications Security
visible light communications
Software Defined Networks
Scalability
safety concerns
Resiliency
resilience
radio networks
pubcrawl
Networks in Buildings
network function virtualisation
Millimeter Wave Communications
Metrics
indoor location accuracy
ITU
IoRL project
Internet of Radio-Light
internet
interference suppression
interference minimization
intelligent building network
access points
broadband wireless access
computer network security
free-space optical communication
global standard
harmful EM exposure
indoor communication
biblio
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network
Submitted by grigby1 on Fri, 10/26/2018 - 3:53pm
INFECT
wireless openaccess research platform
wireless LAN
Trojan horses
Signal to noise ratio
security
Scalability
Robustness
Resiliency
radio transmitters
radio receivers
radio networks
pubcrawl
802.11a/g transmitter
inconspicuous FEC-based trojan
hardware attack
forward error correction
FEC encoding
Decoding
Contamination
channel noise profiling
channel noise
channel coding
Binary phase shift keying
802.11a/g wireless network
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by grigby1 on Fri, 10/26/2018 - 3:52pm
telecommunication network reliability
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
pubcrawl
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
encryption
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
coding scheme reliability
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
biblio
Distributed timely-throughput optimal scheduling for wireless networks
Submitted by el_wehby on Wed, 05/23/2018 - 5:08pm
Optimal scheduling
wireless sensor networks
wireless networks
Wireless communication
virtual debts
Throughput
telecommunication traffic
telecommunication scheduling
Scheduling algorithms
Schedules
reliable data delivery
radio networks
optimal transmission decision making
arrival rate vectors
maximum network throughput
maximum network capacity region
incoming traffic rate
distributed timely-throughput optimal scheduling algorithm
distributed algorithms
delays
delay deadlines
Decision Making
data communication
CSMA-type protocols
carrier sense multiple access
1446484
biblio
Environment-Aware Indoor Localization Using Magnetic Induction
Submitted by el_wehby on Wed, 05/23/2018 - 5:07pm
Magnetic Induction
wireless networks
wireless applications
Transmitters
transmission media
Receivers
radio networks
radio links
position information
phase shifting
MI-based wireless networks
MI signals
MI communication
Coils
LOS links
line-of-sight links
joint device localization and conductive-object tomography algorithm
indoor navigation
Indoor environments
floor planning
estimation errors
environment-aware indoor localization
electromagnetic induction
Conductivity
conductive walls
complex nonLOS environments
1446484
« first
‹ previous
1
2
3
4
5
6
next ›
last »