Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Interference
biblio
Using friendly jamming to improve route security and quality in ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
security performance
pubcrawl
Receivers
Resiliency
route security
Routing
secrecy outage probability
security
Security Metrics
physical layer security technique
service quality metrics
Signal to noise ratio
SOP
telecommunication network reliability
telecommunication network routing
telecommunication security
wireless area network
eavesdroppers
Ad hoc networks
auxiliary variable
composability
connection outage probability
convex optimization problem
convex programming
COP
D2D network
Ad Hoc Network Security
friendly jamming
Human behavior
Human Factors
Interference
Jamming
machine-to-machine communication
Measurement
biblio
TTLock: Tenacious and traceless logic locking
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
IP piracy
TTLock
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Policy
logic locking
IP piracy revention
collaboration
Interference
intellectual property protection technique
intellectual property
industrial property
Foundries
computer science
Computers
Computer crime
composability
biblio
Identifying Reversible Circuit Synthesis Approaches to Enable IP Piracy Attacks
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
Logic gates
Training data
TBS
Support vector machines
security
Reversible logic
reversible circuit synthesis approaches
Resiliency
QMDD
pubcrawl
policy-based governance
Policy
network synthesis
machine learning algorithms
machine learning
BDD
logic design
logic circuits
learning (artificial intelligence)
IP piracy attacks
IP piracy
Interference
integrated circuit piracy
Integrated circuit modeling
industrial property
ESOP
embedded function
composability
collaboration
biblio
Learning to detect and mitigate cross-layer attacks in wireless networks: Framework and applications
Submitted by grigby1 on Wed, 01/10/2018 - 11:24am
composability
Cross Layer Security
delays
Interference
Jamming
pubcrawl
Resiliency
security
Signal to noise ratio
Throughput
wireless networks
biblio
Security beamforming algorithms in multibeam satellite systems
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
BF weight vectors
signal processing security
ZF BF algorithm
zero-forcing BF algorithms
zero-forcing
the sum of achievable secrecy rate
SLNR BF algorithm
signal-to-leakage-and-noise ratio
security beamforming algorithms
satellite communication
power allocation coefficients
optimization problem
on-board satellite transmit power constraint
multibeam satellite communication system
multibeam satellite
legitimate user
security
achievable secrecy rate
Signal to noise ratio
Satellites
Satellite broadcasting
telecommunication security
array signal processing
physical layer security
Interference
optimization
optimisation
composability
privacy
Resiliency
pubcrawl
Metrics
biblio
Physical layer security in IoT: A spatial-temporal perspective
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
delay
signal processing security
Stochastic processes
Queueing analysis
physical layer security
on-off scheme
Interference
Geometry
delays
security
composability
performance evaluation
privacy
Resiliency
pubcrawl
Metrics
IoT
biblio
Resource allocation based on clustering algorithm for hybrid device-to-device networks
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Algorithm design and analysis
clustering algorithm
Clustering algorithms
D2D communication
Device-to-device communication
Information Reuse
Interference
Manganese
pubcrawl
Resiliency
resource allocation
resource management
security
Signal to noise ratio
biblio
Evaluating physical-layer security for secondary users in cognitive radio systems with attackers
Submitted by K_Hooper on Wed, 12/20/2017 - 10:28am
Bandwidth
Cognitive Radio Security
Interference
Jamming
pubcrawl
Radio frequency
Resiliency
security
sensors
Wireless communication
biblio
Physical layer security of non-orthogonal multiple access in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 10:28am
Cognitive Radio Security
Interference
network security
NOMA
non-orthogonal multiple access
Physical layer
physical layer security
power system reliability
probability
pubcrawl
Resiliency
underlay cognitive radio
biblio
Network-Wide Optimization of Uplink Fractional Power Control in LTE Networks
Submitted by grigby1 on Wed, 03/08/2017 - 12:56pm
network-wide optimization
uplink transmitter
uplink fractional power control
Uplink
telecommunication control
Signal to noise ratio
radiofrequency interference
radio transmitters
pubcrawl170110
power control
optimization
optimisation
next generation networks
next generation cellular networks
Bandwidth
network optimization
multiKPI optimization problem
LTE networks
Long Term Evolution
Load modeling
key performance indicators
interference environment
Interference
FPC parameters
discrete optimization problem
dense deployment
coordinate interference
cellular radio
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »