Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software radio
biblio
Effective Wireless Communication Architecture for Resisting Jamming Attacks
Submitted by grigby1 on Thu, 09/16/2021 - 12:10pm
Communication system security
computer architecture
Computer crime
denial of service (dos)
Jamming
jamming attack
pubcrawl
resilience
Resiliency
Resilient Communication System
Resilient Security Architectures
software defined radio
software radio
Wireless communication
biblio
Optimized Spectrum sensing Techniques for Enhanced Throughput in Cognitive Radio Network
Submitted by aekwall on Mon, 03/15/2021 - 11:02am
added delay
Cognitive Radio Security
wireless communication system
wireless applications
transmission delay
throughput optimization
spectrum scarcity
Sensing throughput tradeoff
secondary users
primary users security
optimized spectrum sensing techniques
optimal sensing time
finite resource
enhanced throughput
Cooperative Spectrum Sensing(CSS)
Cognitive Radio Network
software defined radio
cognitive radio networks
cognitive radio
signal quality
radio spectrum management
Cascading style sheets
signal detection
Throughput
sensors
software radio
radio networks
Signal to noise ratio
optimization
pubcrawl
Resiliency
biblio
CloakLoRa: A Covert Channel over LoRa PHY
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
lora
software radio
covert communication
amplitude modulated covert channel
amplitude modulation
CloakLoRa
COTS LoRa nodes
covert information
differentiate LoRa symbols
Chirp
LoRa chirps
LoRa PHY
LoRa physical layer
regular LoRa node
regular LoRa packet
spread spectrum communication
unique modulation scheme
Cryptography
Cascading style sheets
Frequency modulation
data encapsulation
covert channels
wireless channels
Compositionality
Receivers
Buildings
Payloads
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
security
biblio
Bluetooth devices fingerprinting using low cost SDR
Submitted by grigby1 on Mon, 12/28/2020 - 11:29am
Clocks
wireless security
wireless communication scheme
transmitters identification
Software Defined Radios
physical-layer fingerprinting approach
low cost SDR
communication protocol
Bluetooth scan
Bluetooth devices fingerprinting
authentication layer
software radio
bluetooth security
Bluetooth
Physical layer
Synchronization
fingerprint identification
composability
Wireless communication
Communication system security
Protocols
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
resilience
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
high data rates
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
BT spectrum analysis
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
address randomization
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
biblio
A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels
Submitted by grigby1 on Wed, 03/04/2020 - 3:15pm
telecommunication security
physical layer security
private key cryptography
pubcrawl
secret key generation studies
security
software radio
TDD
TDD mode
Pearson correlation coefficient
theoretical analysis
theoretical cryptography
time division duplexing
time division multiplexing
USRP
wireless channel reciprocity
wireless channels
X310 universal software radio peripheral
FDD
channel state information
composability
Compositionality
correlation methods
CSI correlation coefficient
eavesdropping attack
eavesdropping distance
eavesdropping wiretap channel model
channel reciprocity
FDD channel reciprocity
FDD wiretap channels
frequency division duplexing
frequency division multiplexing
indoor radio
indoor wireless CSI measurement system
legitimate channel
N210
biblio
IoT Devices Security Using RF Fingerprinting
Submitted by grigby1 on Mon, 02/17/2020 - 4:05pm
software defined radio
Radio frequency
Radio Frequency Fingerprinting
RF Fingerprinting
Scalability
scalability problems
SDR
security
security scalability
smart devices
pubcrawl
software radio
telecommunication security
Telecommunication standards
universal SDR-based inexpensive implementation
user-dedicated modes
Wireless communication
wireless RFF
wireless security authentication
feature extraction
authentication problem
Compositionality
computational complexity
computer network security
Cryptographic Protocols
cryptography-based authentication protocols
device identity fingerprint
emitted wireless signals
authentication
Fingerprint recognition
Internet of Things
Internet of Things devices industry
IoT
IoT devices security
mobile phone signal burst extraction
Object recognition
physical layer-based security authentication method
biblio
A filter selection based physical layer security system
Submitted by aekwall on Mon, 03/25/2019 - 8:58am
filter design
signal processing security
USRP
software radio
RRC
root raised cosine filters
Roll of factor
radio networks
physical layer security system
physical layer security method
physical layer security
Physical layer
filtering theory
filter selection
network security
EVM
eavesdropping attacks
eavesdropper
Signal to noise ratio
Metrics
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
telecommunication security
Receivers
Conferences
biblio
Software Defined Radio Based Mixed Signal Detection in Spectrally Congested and Spectrally Contested Environment
Submitted by grigby1 on Wed, 04/11/2018 - 1:54pm
Software
Resiliency
RF signal component
RF signals
Scalability
SCF cyclostationary feature
SDR based implementation
second order spectrum correlation function cyclostationary fea- ture
security
signal detection
signal generators
resilience
software defined radio based mixed RF signal generator
software defined radio based mixed signal detection
software radio
spectrally congested environment
spectrally contested environment
symbol rate
telecommunication security
time domain analysis
Time Frequency Analysis
Time-frequency Analysis
initial phase offset
cyber physical systems
cyber security application
cyclostationary domain analysis
Detectors
frequency domain analysis
frequency-domain analysis
Generators
graphical user interface
graphical user interfaces
GUI
carrier frequency
initial time delay
Metrics
mixed signal detection
modulation
multiple signal
parameter estimation
pubcrawl
pulse shaping filter
Radio frequency
biblio
Demonstrating State-Based Security Protection Mechanisms in Software Defined Networks
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
privacy
virtualisation
threat vectors
telecommunication control
Switches
switch identification
stateful data-plane designs
software radio
software defined networking
security of data
SDN-specific attacks
SDN-NFV
SDN security protection mechanisms
SDN configuration security protection mechanism
pubcrawl
adaptive network security services
Ports (Computers)
network function virtualization technologies
necessary control functions
Metrics
link reconfiguration
Customer Relationship Management
controller interaction
computer network security
computer network management
Communication networks
automated network security services
authentication
application program interfaces
1
2
next ›
last »