Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Interference
biblio
Research on Cyber Security Test Method for GNSS of Intelligent Connected Vehicle
Submitted by grigby1 on Wed, 06/30/2021 - 3:39pm
automobiles
Compositionality
computer security
cyber security
Global navigation satellite system
GNSS
Intelligent connected vehicle
intelligent data
Interference
pubcrawl
Receivers
resilience
Resiliency
Scalability
security
Test methods
biblio
Fast HEVC Selective Encryption Scheme Based on Improved CABAC Coding Algorithm
Submitted by grigby1 on Wed, 05/05/2021 - 12:40pm
Interference
syntax elements
Syntactics
Selective Encryption
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
collaboration
Human Factors
Human behavior
high efficiency video coding
entropy coding
Entropy
encryption
encoding
context-based adaptive binary arithmetic coding
biblio
Information-spectrum methods for information-theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
information-theoretic security
wiretap channels
telecommunication security
secure rates
secrecy capacity
Scalability
Resiliency
Random variables
pubcrawl
policy-based governance
Mutual information
Metrics
Jamming
Interference
channel state information
information-spectrum methods
information theory
information theoretic security
information security
Information analysis
Human behavior
feedback
fading channels
Fading
ergodic fading channels
Cryptography
complex communication scenarios
biblio
On the Impact of SSDF Attacks in Hard Combination Schemes in Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:05pm
MAJORITY-rule
critical threats
CSS
different hard-decision fusion schemes
fusion center
hard combination schemes
hard data
hard data combining
hard-decision combination
hard-decision fusion scheme
licensed frequency bands
cooperative spectrum sensing
malicious user
miss detection
OR-rule
Primary User spectrum accessibility
PU
Spectrum Sensing Data Falsification reports
SSDF attacks
user performs Energy Detection
Cognitive Radio Security
cooperative communication
Resiliency
pubcrawl
Signal to noise ratio
probability
collaboration
Bandwidth
Interference
radio networks
sensors
telecommunication security
signal detection
Cascading style sheets
malicious users
radio spectrum management
cognitive radio
cognitive radio networks
detection performance
AND-rule
AYMU attacks
biblio
Cooperative Spectrum Sensing and Hard Decision Rules for Cognitive Radio Network
Submitted by aekwall on Mon, 03/15/2021 - 12:02pm
unused spectrum
Cognitive Radio Security
unlicensed spectrum
spectrum sensing cognitive radio
spectrum sensing
spectrum owners
spectrum hole
Simulink Energy Detection
sense signals
recycle licensed spectrum
primary users
MATLAB Simulink
energy detection
cooperative spectrum sensing
Cooperative Sensing
Cognitive Radio Network.
Detectors
Cognitive Radio Network
cognitive radio
fading channels
radio spectrum management
Wireless communication
AWGN channels
signal detection
cooperative communication
multi-access systems
Interference
Signal to noise ratio
pubcrawl
Resiliency
mobile computing
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
On the Distributed Jamming System of Covert Timing Channels in 5G Networks
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
covert channels
modulation method
modulation
jam system
interference algorithm
fifth generation mobile network
diversity reception
diversity networks
distributing jammer
distributed jamming system
co-constructing and sharing
5g network
5G mobile network
radiofrequency interference
Jamming
security
Interference
covert channel
covert timing channel
Transmitters
timing
Compositionality
network security
5G mobile communication
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
Servers
biblio
Mitigation of Frequency-Hopped Tick Jamming Signals
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
jamming components
tick signals
STRIKE3 project
standardisation of GNSS threat reporting and receiver testing through international knowledge exchange
Scalability
satellite navigation
Robust Interference Mitigation techniques
RIM techniques
Resiliency
resilience
radio receivers
pubcrawl
notch filters
Metrics
jamming to noise power ratio
jamming power
adaptive filtering
Jamming
interference suppression
interference mitigation
Interference
instantaneous frequency
GNSS jamming
GNSS
Global Navigation Satellite System jamming
frequency-hopped tick Jamming signals
frequency hop communication
frequency discontinuities
experimentation and exploitation
ANF
adaptive notch filters
adaptive filters
biblio
Adaptive filtering of non-fluctuation interference when receiving signals with multi-position phase shift keying
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
non-fluctuation interference
weighting coefficients
signal with multi-position phase shift keying
Signal to noise ratio
Scalability
Resiliency
resilience
recursive filters
receiving signals
Receivers
quadrature coherent signal receiver
pubcrawl
Power harmonic filters
Phase shift keying
optimal filter parameters
nonfluctuation interference
adaptation coefficient
noise immunity
multiposition phase shift keying
Metrics
interference (signal)
Interference
harmonic interference
Harmonic analysis
filtering theory
constant envelope
Bit error rate
adjustment algorithm
adaptive nonrecursive filter
adaptive filters
adaptive filtering
adaptive filter
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by aekwall on Mon, 12/14/2020 - 12:43pm
dynamic spectrum access
Tsunami
Truthful user Sybil-proof aUctioN mechAnisM
Sybil-proof spectrum auction mechanisms
spectrum shortage problem
spectrum allocation efficiency
single secondary user
sequential matching approach
primary user Sybil-proof aUctioN mechAnisM
online spectrum auction
onlIne spectrum allocation
cost-efficient SUs
bid-independent sorting method
2D truthfulness
Resiliency
Cost accounting
DSA
electronic commerce
Resists
radio networks
Interference
Metrics
Wireless communication
resource management
sybil attacks
composability
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »