Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
jamming attack
biblio
Ready-IoT: A Novel Forensic Readiness Model for Internet of Things
Submitted by aekwall on Fri, 02/25/2022 - 10:47am
composability
synchronization attack
Network provenance
jamming attack
IoT dataset
forensic readiness
Provenance
Forensics
visual databases
security
Human behavior
Resiliency
Metrics
pubcrawl
feature extraction
Protocols
data privacy
Internet of Things
biblio
Effective Wireless Communication Architecture for Resisting Jamming Attacks
Submitted by grigby1 on Thu, 09/16/2021 - 1:10pm
Communication system security
computer architecture
Computer crime
denial of service (dos)
Jamming
jamming attack
pubcrawl
resilience
Resiliency
Resilient Communication System
Resilient Security Architectures
software defined radio
software radio
Wireless communication
biblio
Securing a Wireless Network-on-Chip Against Jamming Based Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:09am
persistent jamming attack
internal hardware Trojans
jamming attack
low-power transceivers
ML classifiers
network-on-chip communications
NoC switches
nonscalable multihop data transmission paths
On chip interconnect
On chip security
on-chip data transfer
on-chip wireless medium
denial-of-service attacks
radio transceivers
radiofrequency interconnections
random burst error correction code
Switches
switching networks
WiNoC security
wired NoC architectures
wireless interconnection
Wireless NoC
wireless NoC architectures
network on chip security
system-on-chip
telecommunication security
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Wireless communication
Metrics
machine learning
telecommunication network routing
telecommunication computing
radio networks
Scalability
DoS
Hardware Security
error correction codes
radiofrequency interference
DoS attack
Jamming
denial-of-service attack
machine learning classifier
HT
network-on-chip
data transfer security threats
biblio
Phase Jamming Attack: A Practical Attack on Physical Layer-Based Key Derivation
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
physical layer security
Wireless communication
Signal to noise ratio
security enhancement performance
security
secret keys
secret key generation
Resiliency
resilience
received signal phase quantisation
Quantization (signal)
pubcrawl
probability
physical-layer security
physical layer-based key derivation procedure
adversary signal transmission
Physical layer
phase quantization regions
phase jamming attack
phase attack
Metrics
key generation technique
jamming attack
Jamming
Cryptography
composability
Communication system security
communication management
communication channel networks
biblio
Review of jamming attack using game theory
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
malicious attack nodes
WSN
wireless sensor networks
Wireless Sensor Network
wireless networks
timing channel
telecommunication security
security threats
security
Scalability
pubcrawl
power expenditure
network load
Metrics
external attack
jamming technique
jamming detection
jamming attack
Jamming
internal attack
interaction model
information preservation
Human Factors
Games
game theory
game theoretic strategies
game theoretic security
game theoretic representation
biblio
A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
pubcrawl
game theoretic security
Human Factors
Metrics
Scalability
Communication-Based Train Control
cyber-physical system
jamming attack
secure control
Stochastic game
biblio
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework
Submitted by grigby1 on Mon, 03/19/2018 - 2:00pm
jamming detection
Wireless communication
Stochastic processes
stochastic games
secret communication
Scalability
Resiliency
resilience
reliable wireless communication
Reliability
pubcrawl
physical layer security
Metrics
legitimate transmission link
Adversary Models
jamming attack
Jamming
intrusion detection system
Human behavior
Games
game theory
game theoretical framework
Eavesdropping detection
eavesdropping
dual detection techniques
computer network security
Communication system security
biblio
SDR-Based Resilient Wireless Communications
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
wireless channels
SDR-based resilient wireless communication
security of data
service attacks
session hijacking
software defined radio
Software Defined Radios
software radio
telecommunication security
Scalability
Wireless communication
wireless communications attacks
wireless communications channels
wireless communications secure
wireless networks
wireless protocols
wireless technologies
jamming attacks
Communication system security
Computer crime
cyberattacks
Denial of Service (DoS) Attack
Denial of Service attacks
Frequency modulation
Jamming
jamming attack
Autonomic Security
Metrics
moving target defense
Protocols
pubcrawl
radio channels
Resiliency
Resilient Communication System
biblio
Impacts of unreliable communication and regret matching based anti-jamming approach in smart grid
Submitted by BrandonB on Fri, 05/01/2015 - 7:49am
Jamming
wireless channels
unreliable wireless communication
smart power grids
Smart Grids
Smart Grid
regret matching
power system management
jamming attack
Algorithm design and analysis
Games
Educational institutions
DRM
demand response management
communication channel
cognitive radio
antijamming attack approach
biblio
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
Submitted by BrandonB on Thu, 04/30/2015 - 2:24pm
spread spectrum systems
primary security threat
probability
radio interference broadcast
radio networks
radiofrequency interference
Receivers
Smart Grid
smart grid application
smart grid communication
Smart Grids
smart power grids
power system security
TACT
telecommunication security
telecommunication traffic
transmitting adaptive camouflage traffic
U-shaped function
well-adopted attack model
wireless communication security
wireless network deployment
wireless networks
worst-case message delay
Jamming
code channel
Communication system security
control messages
cyber-physical system
delay performance guarantee
delays
existing attack model
generic jamming process
information exchange
information technologies
camouflage traffic
jamming attack
jamming attacks
jamming resilience
latency guarantee
message delay minimization
multiple-frequency channel
network load balance
network traffic load
Power distibution
power infrastructures