Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cellular networks
biblio
Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
optimal beamforming matrix
Downlink
downlink cellular network
eavesdroppers
Interference
legitimate mobile stations
multiple beam forming matrices
novel pseudorandom beamforming technique
opportunistic feedback
opportunistic scheduling
cellular radio
orthogonal beamforming vectors
radio links
Random beamforming
received signal-to-interference-and-noise ratio value
received SINR value
secrecy rate
secrecy sum-rate maximization
signal processing security
Signal to noise ratio
security
Resiliency
pubcrawl
composability
Wireless communication
matrix algebra
Metrics
Vectors
telecommunication security
physical-layer security
antenna arrays
antennas
array signal processing
base station
beam selection
BS
Cellular networks
biblio
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
Resiliency
OMNET++
proactive security
proximity-based attack analysis
proximity-based cybercrime
pubcrawl
RAT
reactive solutions
resilience
high-level approach
routine activity theory
security
Security analysis
security problems
security software developers
Software
telecommunication security
5G cellular networks
Hardware
Device-to-device communication
critical IoT devices
CRAT
composability
cellular radio
Cellular networks
capillary network
autonomous vehicles
Autonomic Security
Analytical models
5G security
5G mobile communication
5G environments
5G devices
biblio
Adaptive Root Cause Analysis for Self-Healing in 5G Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:21pm
return on investment
network data
network experts
pattern classification
probabilistic Bayesian classifier
probability combinations
probable root cause
pubcrawl
quality of service
RCA process
resilience
Resiliency
Manuals
ROI
Root cause analysis
self-healing
self-healing networks
self-organising feature maps
self-organizing network
SH
SON based solutions
stratified synthesized data
telecommunication computing
Cellular networks
5G mobile communication
5G networks
adaptive learning
adaptive root cause analysis
adaptive systems
ARCA
automated evidence based RCA
automated fault detection
Bayes methods
Bayesian network theory
belief networks
5G
composability
domain knowledge reuse
fault detection
fault diagnosis
fault tolerant computing
Incomplete Data
learning (artificial intelligence)
Long Term Evolution
LTE Advanced
LTE-A
biblio
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 11:39am
NAT overflow attack
IPv6 middlebox
ipv6 security
Logic gates
Metrics
Middlebox
middlebox security problems
Middleboxes
Mobile handsets
NAT bricking attack
IPv6 cellular networks
NAT resources
NAT wiping attack
over-billing attacks
pubcrawl
Resiliency
security
stateful NAT64 boxes
TCP sequence number verification
telecommunication services
denial-of-service attacks
backward compatibility
cellular devices
cellular middleboxes
cellular network
Cellular networks
cellular operators
cellular radio
collaboration
composability
active NAT mappings
firewalls
IP address
IP networks
IP-based blacklisting
IPv4 address
IPv4 services
IPv6
IPv6 address
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
Identity management using blockchain for cognitive cellular networks
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
pubcrawl
integrated circuits
network signaling traffic
opportunistic network access technologies
Performance
privacy
privacy-enhancing user identity management system
Protocols
pseudonymous identities
Identity management
radio spectrum management
Resiliency
Scalability
spectrum crunch
telecommunication network management
telecommunication security
telecommunication signalling
telecommunication traffic
Cloud Computing
assertion
authentication
authorization
blockchain
blockchain technology
Cellular networks
cellular radio
cloud-centric cognitive cellular networks
accounting
cognitive cellular network blockchain
cognitive radio
contracts
Cryptography
dynamic spectrum access
end-to-end management
Human behavior
biblio
9-1-1 DDoS: Attacks, Analysis and Mitigation
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Mobile handsets
DDoS attack mitigation
distributed denial of service attack
e911
emergency call centers
emergency services
FCC regulations
firmware
Human behavior
invasive software
Metrics
DDoS
mobile phone Botnet
Object recognition
PSAP
pubcrawl
Resiliency
rootkit
smartphone
TDoS
Terrorism
cellular identifiers
911
911 emergency service
anonymized attacks
anonymized phones
anonymous attacks
Baseband
baseband firmware
botnet
Cellular
9-1-1 DDoS
cellular network protocols
Cellular networks
cellular radio
composability
Computer crime
computer network security
critical infrastructure sectors
critical infrastructures
Cryptographic Protocols
biblio
CleanG: A Clean-Slate EPC Architecture and ControlPlane Protocol for Next Generation Cellular Networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:50pm
Cellular networks
mobile core network
network function virtualization
pubcrawl170201
Software Defined Networks
biblio
Exploring the potential for full-duplex in legacy LTE systems
Submitted by BrandonB on Tue, 05/05/2015 - 9:58am
Base stations
Cellular networks
Downlink
FD-LTE
Frequency conversion
full-duplex communications
interference suppression
Long Term Evolution
LTE systems
passive SI cancellation schemes
radio spectrum management
receiving antennas
self-interference suppression
Silicon
spectral efficiency
Uplink
biblio
Trustworthy Operations in Cellular Networks: The Case of PF Scheduler
Submitted by BrandonB on Fri, 05/01/2015 - 8:54am
Cellular networks
misreporting attack
PF scheduler
trust
« first
‹ previous
1
2