Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cooperative jamming
biblio
Strategy of Relay Selection and Cooperative Jammer Beamforming in Physical Layer Security
Submitted by aekwall on Sun, 10/16/2022 - 6:10pm
pubcrawl
Metrics
Resiliency
composability
Jamming
physical layer security
resource management
Power demand
Relays
Vehicular and wireless technologies
power allocation
array signal processing
cooperative jamming
relay selection
biblio
A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels
Submitted by aekwall on Sun, 10/16/2022 - 6:03pm
Interference
game theoretic security
wireless communication network
security game
Pricing
channel capacity
Bayesian equilibrium
cooperative jamming
eavesdropping
Human Factors
Predictive Metrics
Probabilistic logic
Receivers
Scalability
pubcrawl
Wireless communication
Games
biblio
Wireless Covert Communications Aided by Distributed Cooperative Jamming Over Slow Fading Channels
Submitted by grigby1 on Tue, 04/19/2022 - 3:15pm
Jamming
Wireless communication
Throughput
security
Scalability
Resiliency
resilience
Receivers
pubcrawl
outage probability
Communication system security
jammer selection
fading channels
covert throughput
covert communications
covert channels
cooperative jamming
Compositionality
composability
biblio
A Cluster-Based Cooperative Jamming Scheme for Secure Communication in Wireless Sensor Network
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Receivers
wireless sensor networks
Wireless communication
Transmitters
simulation
sensor security
security
Resiliency
resilience
cluster-based WSNs
pubcrawl
physical layer security
orthogonality
Metrics
Jamming
Human behavior
cooperative jamming
composability
biblio
"The two-hop interference untrusted-relay channel with confidential messages"
Submitted by grigby1 on Tue, 02/14/2017 - 1:05pm
pubcrawl
wireless channels
untrusted relay node
two hop interference untrusted relay channel
Trusted Computing
telecommunication security
structured codes
stochastic encoding
security
secure rate region
scaled compute-and-forward
Relays
relay networks (telecommunication)
radiofrequency interference
Science of Security
confidential messages
nested lattice codes
message transmission
message destination
Lattices
Jamming
Interference
Gaussian processes
Gaussian codewords
encryption block
encoding
direct links
Decoding
Cryptography
cooperative jamming