Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Interference
biblio
A centralized inter-cell rank coordination mechanism for 5G systems
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
MMSE receiver
conventional non interference-aware schemes
future fifth generation wireless system
game-theoretic interference pricing measure
intercell interference management mechanism
interference aware intercell rank coordination framework
interference pricing
interference resilience property
interference resilience trade-off
least mean squares methods
linear minimum mean squared error receivers
mean signal-to-interference-plus-noise ratio
centralized intercell rank coordination mechanism
MMSE receivers
multiple receive antennas
multiple transmit antennas
random matrix theory
rank adaptation
receiving antennas
space division multiplexing
spatial multiplexing
transmitter-receiver pair
transmitting antennas
antenna arrays
pubcrawl
matrix algebra
Interference
Receivers
radio receivers
radiofrequency interference
Signal to noise ratio
estimation
resilience
Throughput
Transmitters
game theory
5G mobile communication
MIMO
search problems
5G
Pricing
Monte Carlo methods
Monte Carlo simulations
Computing Theory
5G systems
brute-force exhaustive search algorithm
biblio
The dose makes the poison \#x2014; Leveraging uncertainty for effective malware detection
Submitted by grigby1 on Fri, 07/06/2018 - 2:05pm
Resiliency
Organizations
OS processes
Plan B
potential malware
promising avenue
pubcrawl
received borderline classifications
resilience
malware
Scalability
sensitive information
software execution
Standards organizations
time-consuming
traditional ML detectors
traditional ML methods
uncertain environment
devastating consequences
AI Poisoning
analyzed benign software
behavioral-based malware detectors
Chameleon
CPU-bound software
deep analysis
deep learning models
Detectors
100 malware samples
effective malware detection
Human behavior
I/O-bound software
Interference
invasive software
learning (artificial intelligence)
Linux
biblio
Distributed adaptive beam nulling to mitigate jamming in 3D UAV mesh networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
optimisation
jamming mitigation
Kalman filter
Kalman filter based tracking mechanism
Kalman filters
MANET
Mesh networks
Metrics
mobile jammer
motion measurement
next generation mission critical wireless networks
jamming attack avoidance
optimization goal
pubcrawl
resilience
Resiliency
spectral utilization
tracking
Unmanned Aerial Vehicles
VANET
wireless mesh networks
beam null border
3D spatial filtering
3D spatial reuse
3D UAV mesh networks
3D wireless mesh networks
adaptive beam nulling
aircraft communication
antennas
attack mitigation
autonomous aerial vehicles
3D mesh
Compositionality
directional antenna
disruptive attacks
distributed adaptive beam nulling
distributed mechanism
Extraterrestrial measurements
Interference
interference suppression
Jamming
biblio
A new anti-jamming reliable routing protocol for tactical MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Routing protocols
neighboring node
node mobility
pubcrawl
Reliability
resilience
Resiliency
Routing
Routing Protocol
neighbor dependency
security
tactical communications
Tactical MANET
Tactical MANETs
telecommunication network reliability
telecommunication security
Wireless communication
Anti-jamming
mobile ad hoc networks
military communication
Metrics
Measurement
MANET
malicious jamming attacks
link stability evaluation
jamming interference
Jamming
Interference
exponential smoothing estimation
data transmission reliability
Compositionality
channel state information
anti-jamming reliable routing protocol
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
Physical layer security transmission in cognitive radio network composed of multi-downlinks SU network
Submitted by grigby1 on Thu, 06/07/2018 - 2:55pm
Signal to noise ratio
secrecy rate
multi-downlinks
Downlink
Cognitive Radio Network
channel selection
Resiliency
Metrics
resilience
pubcrawl
beamforming
array signal processing
Receivers
Physical layer
physical layer security
Interference
network security
composability
biblio
Efficient Multichannel Communications in Wireless Sensor Networks
Submitted by el_wehby on Fri, 05/25/2018 - 3:47pm
Channel allocation
Interference
multichannel
wireless sensor networks
1536086
biblio
INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
Observers
vehicular ad hoc networks
VANET traffic safety
VANET Security
telecommunication security
sybil attacks
sybil attack detection mechanism
Sybil attack detection
Safety
RSSI-based localization technique
RSSI
road traffic
Resiliency
Radio propagation
pubcrawl
automobiles
Metrics
Location Accuracy
localization techniques
localization
INTERLOC
interference-aware RSSI-based localization
interference (signal)
Interference
inter-vehicular communications
heterogeneous interference
GPS
Global Positioning System
composability
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
A generalized optimization framework for control plane in tactical wireless networking
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
optimisation
wireless networks
wireless multihop tactical networking
Transmitters
throughput maximization problem
Throughput
telecommunication control
tactical wireless networking
spread spectrum communication
seamless multihop communications
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy governance
optimization
Ad hoc networks
network layers
multihop tactical wireless networks
military communication
Metrics
Interference
Human Factors
human factor
Human behavior
global network optimization framework
generalized optimization framework
crosslayer optimization framework
control plane
collaboration
clean slate
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »