Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
signal processing
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
biblio
Two-way real time multimedia stream authentication using physical unclonable functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:04pm
Multimedia Signal Processing
Xilinx
video surveillance
telecommunication security
Streaming media
signal processing
Resiliency
Receivers
real-time systems
pubcrawl
physical unclonable functions
multimedia stream authentication
authentication
Multimedia communication
Metrics
media streaming
license/key management
Human Factors
Human behavior
hardware-based security
Hardware
FPGA
Digital rights management
biblio
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet
Submitted by grigby1 on Tue, 09/05/2017 - 1:50pm
attack
composability
digital signal processing
eavesdropping
Ethernet
FPGA
Metrics
privacy
pubcrawl
Resiliency
signal processing
signal processing security
tempest
biblio
HMAC based one t #x0131;me password generator
Submitted by BrandonB on Wed, 05/06/2015 - 11:51am
HMAC
standards
Signal processing algorithms
signal processing
Production
One Time Passwords
one time password production methods
one tıme password generator
message authentication
Keccak digest algorithm
Keccak
authentication
hashing-based message authentication code structure
Hash-Based Message Authentication Code
Hash functions
Hash Function
hash algorithm
fixed length strings
electronic media
Cryptography
Conferences
biblio
Secure fault tolerance mechanism of wireless Ad-Hoc networks with mobile agents
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
related works
wireless self-organization networks
wireless ad hoc networks
unauthorized attempts
telecommunication security
telecommunication network reliability
signal processing
security threats
security reliability
security precautions
secure mobile agent
secure fault tolerance
secure communication
Ad hoc networks
mobile nodes
mobile agents
mobile agent migration
mobile agent
mobile ad hoc networks
Fault tolerant systems
fault tolerance
fault masking
Erbium
dynamic self-organization networks
Conferences
Ad-Hoc Network
biblio
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT)
Submitted by BrandonB on Tue, 05/05/2015 - 10:21am
eavesdropper
telecommunication security
signal processing applications
signal processing
security codes
security code
security
secure communication systems
physical layer security
OFDM
Mobile communication
flip-flops
error-free legitimate channel
codes
distortion
distort signal parameter
discrete fractional Fourier fransform
Discrete Fourier transforms
DFRFT
crosslayer
cross-layer strong mobile communication secure model
cross-layer secure communication model
cross-layer DFRFT security communication model
cross-layer
Constellation diagram
biblio
Smart diagnose procedure for data acquisition systems inside dams
Submitted by BrandonB on Tue, 05/05/2015 - 9:16am
microcontrollers
Voltage measurement
Transducers
testing
Temperature measurement
system
structural engineering computing
smart diagnose procedure
signal processing
short-circuit
Sensor
RS485 communication protocol standard
Protocols
protocol
open-circuit
Central Processing Unit
microcontroller
field buses
Electronics packaging
differential signal
diagnose
Data Transmission
data loggers
data logger
data acquisition system
data acquisition
dams
dam monitoring
dam
communication bus
biblio
Edit Detection in Speech Recordings via Instantaneous Electric Network Frequency Variations
Submitted by BrandonB on Fri, 05/01/2015 - 8:19am
forensic audio analysis
voice activity detection
speech recordings
speech processing
Spectral analysis
signal processing chain
signal processing
originally noisy database signals
nominal frequency
Noise measurement
instantaneous frequency
instantaneous electric network frequency variations
frequency estimation
Acoustic signal processing
equal error rate
ENF analysis
electrical network frequency analysis
EER
edit detection
distinct annotated database
Digital Forensics
detection criterion
broadband background noise
audio recording
audio edit events
Acoustical signal processing
biblio
Redundancy management in heterogeneous wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:58pm
query success probability
wireless sensor networks
Wireless Sensor Network
unreliable nodes detection
Tin
telecommunication network reliability
source node
signal processing
signal dissemination
Reliability
redundancy management algorithm
Redundancy
queueing theory
ad hoc network
query reliability
quality of service
probability
network efficiency
multipath routing
intrusion tolerance
Indexes
heterogeneous wireless sensor networks
geographical area
destination node
Ad hoc networks
biblio
Mobile agent based intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 1:26pm
mobile agent
suspicious patterns identification
signal processing
security of data
NIDS
network-based system
network activity
mobile agents
mobile agent based intrusion detection system
Anomaly Detection
misuse detection
Intrusion Detection
internet
Informatics
host-based system
cyber attack
Conferences
Computers
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »