Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious user
biblio
On the Impact of SSDF Attacks in Hard Combination Schemes in Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 11:05am
MAJORITY-rule
critical threats
CSS
different hard-decision fusion schemes
fusion center
hard combination schemes
hard data
hard data combining
hard-decision combination
hard-decision fusion scheme
licensed frequency bands
cooperative spectrum sensing
malicious user
miss detection
OR-rule
Primary User spectrum accessibility
PU
Spectrum Sensing Data Falsification reports
SSDF attacks
user performs Energy Detection
Cognitive Radio Security
cooperative communication
Resiliency
pubcrawl
Signal to noise ratio
probability
collaboration
Bandwidth
Interference
radio networks
sensors
telecommunication security
signal detection
Cascading style sheets
malicious users
radio spectrum management
cognitive radio
cognitive radio networks
detection performance
AND-rule
AYMU attacks
biblio
Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network
Submitted by grigby1 on Thu, 12/05/2019 - 9:55am
PUE attack
unused spectrum
total error reduction
total error probability
telecommunication security
spectrum sensing interval
Signal to noise ratio
sensors
security issues
secondary users
Resiliency
resilience
radio transmitters
radio spectrum management
attacker strength
pubcrawl
probability
primary user spectrum bands
primary user emulation attack
Neyman-Pearson criterion
malicious user
error probability
energy detector
emulation
emulated primary signal
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
biblio
Blind Channel Direction Separation Against Pilot Spoofing Attack in Massive MIMO System
Submitted by grigby1 on Fri, 02/08/2019 - 3:35pm
MIMO communication
Vectors
Uplink
Trustworthy Systems
telecommunication security
signal space vector
Signal processing algorithms
signal processing
Resiliency
resilience
radiofrequency interference
pubcrawl
pilot spoofing attack scenario
pilot spoofing attack
partial channel state information
antennas
massive MIMO system
massive MIMO
malicious user
interference symbols
Europe
cyber physical systems
CSI
composability
channel estimation process
Channel estimation
blind source separation
blind channel separation
blind channel direction separation
base-station
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context