Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
radio networks
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
biblio
Preserving Location Privacy in Radio Networks Using a Stackelberg Game Framework
Submitted by grigby1 on Fri, 05/19/2017 - 1:58pm
Compositionality
Human behavior
information theoretic security
location privacy
Metrics
pubcrawl
radio networks
Resiliency
security
Stackelberg game
wireless networks
biblio
"Multi-path Based Avoidance Routing in Wireless Networks"
Submitted by grigby1 on Tue, 02/14/2017 - 12:52pm
multipath message avoidance routing protocol
wireless network
speedy advancement
secure communication
Routing protocols
Routing
radio networks
pubcrawl170102
network coding
coding scheme
multipath channels
MPAR protocol
encryption
encoding
electronic messaging
data encryption
Cryptographic Protocols
computer hardware
biblio
"Circuit design to improve security of telecommunication devices"
Submitted by grigby1 on Tue, 02/14/2017 - 12:28pm
military forces
tunneling
TETRA
Telecommunication standards
telecommunication security
telecommunication devices
telecommunication device security
Telecommunication
SusTech
security
radio networks
radio equipment
pubcrawl170102
project 25
5G mobile communication
Iron
GSM
exclusive channel
encryption
economical circuit
Design Circuit
Cryptography
Conferences
coding
circuit design
attackers
Artificial Intelligence
accidental damage
biblio
"An integrated signaling-encryption mechanism to reduce error propagation in wireless communications: performance analyses"
Submitted by grigby1 on Mon, 02/13/2017 - 2:19pm
signaling encryption mechanism
Monte Carlo simulations
pubcrawl170102
quality of service
quality of service (QoS)
radio networks
Rayleigh channels
Rayleigh fading
Rayleigh fading-type channels
reduce error propagation
integrated signaling encryption mechanism
telecommunication security
Throughput
time delay processing
transmission data rate
wireless channel interference
wireless channels
Wireless communication
Wireless communications
encryption
advanced encryption standard (AES)
AES
Bit error rate
bit-error probability
bit-error rate
bit-error rate performance
convolutional error correction coding
Cryptography
encoding
advanced encryption standard
encryption techniques
error correction codes
error correction coding
error statistics
fading channels
Gaussian fading-type channels
Hamming coding
incorporate error correction
biblio
"Secure communication using TPC and chaotic encryption"
Submitted by grigby1 on Fri, 02/10/2017 - 3:03pm
encryption
wireless communication system
turbo product code
turbo codes
TPC
secure communication
radio networks
pubcrawl170102
Product codes
logistic map
BER
encoding
DWT
Decoding
Cryptography
chaotic encryption
chaos
channel encoding techniques
channel encoding
Bit error rate
biblio
Many-to-all priority-based network-coding broadcast in wireless multihop networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
priority-based deadlock prevention
wireless networks
wireless multihop networks
Wireless communication
Vectors
trees (mathematics)
Topology
telecommunication network topology
System recovery
radio networks
Protocols
broadcast
packet transmission
network coding
minimum transmission broadcast problem
maximum out-degree problem
many-to-all- with-network-coding MTB problem
Energy Efficiency
encoding
distributed many-to-all priority-based network-coding broadcast protocol
broadcast trees
biblio
Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets
Submitted by BrandonB on Wed, 05/06/2015 - 9:23am
software defined radio
radio networks
radio receivers
radio transmitters
radiometric signature
receiver
SDR
Signal to noise ratio
signal-to-noise ratio
radio frequency oscillators
software radio
telecommunication security
time varying carrier frequency offsets
transmitter
Wireless communication
wireless communications devices
wireless device authentication
Kalman prediction error
carrier frequency offset (CFO)
CFO
Doppler shift
estimation
fading channels
Hypothesis testing
Kalman filtering
Kalman filters
authentication
mobile systems
multipath channels
multipath fading channels
nominal oscillating frequency
Physical layer
physical layer authentication
prototype platform
biblio
Prevention of multiple spoofing attacks with dynamic MAC address allocation for wireless networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
MAC Spoofing attacks
wireless networks
Wireless Network Security
Wireless communication
telecommunication security
spoofing attack detection
received signal strength
radio networks
Monitoring
MD5 hashing
Accuracy
Hardware
EPAM clustering
enhanced partitioning around medoid
Electronic mail
dynamic MAC address allocation
Cryptography
Broadcasting
Attacks Detection and Prevention
biblio
Robust security network association adjusted hybrid authentication schema
Submitted by BrandonB on Tue, 05/05/2015 - 8:44am
monitoring mechanism
wireless vulnerability situation
wireless network
Wireless Intrusion Prevention System
Wireless Intrusion Detection System
Wireless communication
Wired Equivalent Privacy
weak authentication
telecommunication security
Servers
Robustness
robust security network association
Robust Secure Network
radio networks
Network Access Protection
802.11 standards
message authentication
IEEE standards
IEEE security standard
hybrid authentication schema
extensible authentication protocol
encryption
Cryptography
Communication system security
authorization
authorisation
authentication
accounting mechanism
802.1X framework
« first
‹ previous
1
2
3
4
5
6
next ›
last »