Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
jamming attacks
biblio
Detecting and Mitigating Jamming Attacks in IoT Networks Using Self-Adaptation
Submitted by grigby1 on Fri, 12/09/2022 - 6:18pm
computer architecture
Internet of Things
Adaptation models
Monitoring
IoT
pubcrawl
resilience
Resiliency
composability
wireless networks
distributed computing
Jamming
jamming attacks
Autonomic Security
Self-Adaptation
biblio
Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks
Submitted by grigby1 on Thu, 05/13/2021 - 12:21pm
Multilayer Perceptron
Wireless Sensor Networks DataSet
wireless sensor networks
Support vector machines
support vector machine
security
Scalability
Resiliency
resilience
pubcrawl
Attack vectors
Machine Learning-based Intrusion Detection System
jamming attacks
Jamming
Intrusion Detection
Human behavior
Communication system security
cloud radio access networks
Cloud Radio Access Network
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by aekwall on Mon, 12/14/2020 - 12:32pm
channel surfing
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
wireless channels
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
pubcrawl
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
Receivers
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
biblio
Design and Evaluation of Jamming Resilient Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:12pm
telecommunication network reliability
Protocols
pubcrawl
random jamming
random strategy
resilience
Resiliency
resource-aware event-triggered control schemes
retrofit ageing
security
sensors
system design challenge
protocol aware strategy
telecommunication security
test-bed results
time-triggered control schemes
water network test-bed
water networks
wireless actuators
Wireless communication
wireless sensor networks
Wireless Sensor/Actuator Networks
wireless sensors
entire CPS failure
aware jamming
classic time-triggered control scheme
constant jamming
constant strategy
control systems
CPS resilience
cyber physical systems
cyber-attacks
cyber-physical systems
design approach
access protocols
event-triggered control
event-triggered control scheme
Jamming
jamming attacks
jamming resilient cyber-physical systems
jamming strategies
large scale infrastructures
next generation cyber-physical systems
physical process
physical processes
biblio
Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications
Submitted by K_Hooper on Wed, 12/20/2017 - 11:28am
proactive jamming attacks
Wireless communication
time-critical data delivery
time-critical applications
Time factors
telecommunication security
telecommunication channels
sensors
security-aware channel assignment
security
Resiliency
pubcrawl
probabilistic spectrum assignment algorithm
Channel allocation
jamming attacks
Jamming
IoT-based CRN
IoT-based cognitive radio networks
Internet of Things
fading conditions
delays
cognitive radio transmission
Cognitive Radio Security
cognitive radio
channel assignment problem
biblio
SDR-Based Resilient Wireless Communications
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
wireless channels
SDR-based resilient wireless communication
security of data
service attacks
session hijacking
software defined radio
Software Defined Radios
software radio
telecommunication security
Scalability
Wireless communication
wireless communications attacks
wireless communications channels
wireless communications secure
wireless networks
wireless protocols
wireless technologies
jamming attacks
Communication system security
Computer crime
cyberattacks
Denial of Service (DoS) Attack
Denial of Service attacks
Frequency modulation
Jamming
jamming attack
Autonomic Security
Metrics
moving target defense
Protocols
pubcrawl
radio channels
Resiliency
Resilient Communication System
biblio
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
Submitted by BrandonB on Thu, 04/30/2015 - 2:24pm
spread spectrum systems
primary security threat
probability
radio interference broadcast
radio networks
radiofrequency interference
Receivers
Smart Grid
smart grid application
smart grid communication
Smart Grids
smart power grids
power system security
TACT
telecommunication security
telecommunication traffic
transmitting adaptive camouflage traffic
U-shaped function
well-adopted attack model
wireless communication security
wireless network deployment
wireless networks
worst-case message delay
Jamming
code channel
Communication system security
control messages
cyber-physical system
delay performance guarantee
delays
existing attack model
generic jamming process
information exchange
information technologies
camouflage traffic
jamming attack
jamming attacks
jamming resilience
latency guarantee
message delay minimization
multiple-frequency channel
network load balance
network traffic load
Power distibution
power infrastructures