Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Downlink
biblio
Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
modular coding scheme
Software-defined radio
Downlink
Human Factors
codes
URLLC
wiretap channel
physical layer security
3GPP
5G
information theoretic security
collaboration
encoding
delays
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G & Beyond
Submitted by grigby1 on Fri, 05/19/2023 - 1:26pm
covert channel
random hashing
MAC layer security
Downlink
6G
Resiliency
5G security
Media Access Protocol
Data Exfiltration
covert channels
security
machine-to-machine communications
resilience
Compositionality
Protocols
5G mobile communication
Scalability
performance evaluation
pubcrawl
biblio
Two-layer Coded Gradient Aggregation with Straggling Communication Links
Submitted by grigby1 on Fri, 08/26/2022 - 9:49am
Servers
pubcrawl
resilience
Resiliency
Data models
composability
encoding
Compositionality
Distributed databases
distributed learning
Computing Theory
Coding computing
computer aided instruction
distance learning
Downlink
straggling
biblio
Analysis of Downlink Scheduling to Bridge between Delay and Throughput in LTE Networks
Submitted by grigby1 on Thu, 02/10/2022 - 1:08pm
Throughput
Scheduling algorithms
RBs Planning
quality of service
QoS
Long Term Evolution
Downlink packet scheduling
Downlink
delays
delay
biblio
Attack Graph Generation and Visualization for Industrial Control Network
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
Industrial control network
vulnerability correlation method
vulnerability classification and correlation
visualization technology
Uplink
three-dimensional interactive attack graph visualization tool
Resiliency
pubcrawl
Predictive Metrics
network topology
network model
large-scale visualization
integrated circuits
attack graph
industrial control
graph theory
Firewalls (computing)
Downlink
data visualisation
Correlation
computer network security
composability
complete attack graph analysis
attack graphs
attack graph generation
attack graph algorithm
biblio
Optimizing Spectrum Pooling for Multi-Tenant C-RAN Under Privacy Constraints
Submitted by aekwall on Mon, 09/28/2020 - 11:09am
participating operators
finite-capacity backhaul links
finite-capacity fronthaul links
fronthaul/backhaul compression strategies
inter-onerator privacy
inter-operator cooperation
inter-tenant privacy constraints
multi-tenant
multitenant C-RAN
multitenant Cloud Radio Access Network system
downlink transmission
privacy constraint
private shared subbands
proprietary radio units
RAN sharing
shared subband
spectrum pooling
user equipments
CPS Privacy
radio access networks
Cloud Computing
data privacy
Human behavior
pubcrawl
privacy
optimization
cyber physical systems
Bandwidth
computer network security
Downlink
Interference
Human Factors
Quantization (signal)
bandwidth allocation
precoding
C-RAN
cloud processor
biblio
Secured Transmission of Data Using Chaos in Wcdma Network
Submitted by aekwall on Tue, 09/08/2020 - 9:05am
multipath channels
additive white gaussian noise channel
AWGN
AWGN and Rayleigh multipath fading channel
binary sequence
binary sequences
chaotic signal transmission
code division multiple access
gold codes
logistic map
Multiaccess communication
BER
PN grouping
QPSK
QPSK modulation techniques
Rayleigh multipath fading channel
spreading code
spreading sequence
W-CDMA framework
Walsh codes
WCDMA
chaotic communication
telecommunication security
Resiliency
pubcrawl
composability
Metrics
channel coding
error statistics
SNR
Downlink
security of data
AWGN channels
network coding
Rayleigh channels
Phase shift keying
data transmission security
Binary codes
spread spectrum communication
fading channels
modulation coding
biblio
Sleeping Cell Analysis in LTE Network with Self-Healing Approach
Submitted by grigby1 on Mon, 02/17/2020 - 4:12pm
Availability
composability
Downlink
pubcrawl
resilience
Resiliency
self-healing
self-healing networks
sleeping cell
Uplink
biblio
Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security
Submitted by aekwall on Mon, 03/25/2019 - 8:58am
optimal beamforming matrix
Downlink
downlink cellular network
eavesdroppers
Interference
legitimate mobile stations
multiple beam forming matrices
novel pseudorandom beamforming technique
opportunistic feedback
opportunistic scheduling
cellular radio
orthogonal beamforming vectors
radio links
Random beamforming
received signal-to-interference-and-noise ratio value
received SINR value
secrecy rate
secrecy sum-rate maximization
signal processing security
Signal to noise ratio
security
Resiliency
pubcrawl
composability
Wireless communication
matrix algebra
Metrics
Vectors
telecommunication security
physical-layer security
antenna arrays
antennas
array signal processing
base station
beam selection
BS
Cellular networks
biblio
Physical layer security transmission in cognitive radio network composed of multi-downlinks SU network
Submitted by grigby1 on Thu, 06/07/2018 - 1:55pm
Signal to noise ratio
secrecy rate
multi-downlinks
Downlink
Cognitive Radio Network
channel selection
Resiliency
Metrics
resilience
pubcrawl
beamforming
array signal processing
Receivers
Physical layer
physical layer security
Interference
network security
composability
1
2
next ›
last »