Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
dynamic spectrum access
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by aekwall on Mon, 12/14/2020 - 11:43am
dynamic spectrum access
Tsunami
Truthful user Sybil-proof aUctioN mechAnisM
Sybil-proof spectrum auction mechanisms
spectrum shortage problem
spectrum allocation efficiency
single secondary user
sequential matching approach
primary user Sybil-proof aUctioN mechAnisM
online spectrum auction
onlIne spectrum allocation
cost-efficient SUs
bid-independent sorting method
2D truthfulness
Resiliency
Cost accounting
DSA
electronic commerce
Resists
radio networks
Interference
Metrics
Wireless communication
resource management
sybil attacks
composability
pubcrawl
biblio
Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications
Submitted by aekwall on Mon, 10/05/2020 - 10:54am
aggregated-query-as-a-secure-service
Dynamic Networks and Security
unlicensed secondary users search
RF spectrum database-driven opportunistic wireless communications
RF spectrum database server
RF channel sensing uncertainties
querying RF spectrum database
location based security
licensed primary users
grid leaders
grid followers
dynamic spectrum access and security
dynamic spectrum access
database-driven dynamic spectrum access approach
telecommunication security
radio spectrum management
wireless channels
Interference
delays
Databases
Metrics
Wireless communication
composability
pubcrawl
Resiliency
Radio frequency
security
biblio
Collaborative Adversarial Modeling for Spectrum Aware IoT Communications
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
Pareto-optimal adversarial strategy design
cooperative communication
cooperative spectrum sensing
DSA paradigm
dynamic spectrum access
dynamic spectrum access based networks
environmental sensing capability
inherent DSA vulnerabilities
large scale future 5G Internet of Things
leader-follower game
Pareto optimisation
collaborative SSDF attack
radio spectrum management
selfish adversarial model
selfish adversary
signal detection
spectrum availability estimation
spectrum aware 5G vision
spectrum aware IoT applications
spectrum aware IoT communications
spectrum sensing data falsification attacks
Adversary Models
collaboration
Internet of Things
security
Computational modeling
Games
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hardware
5G mobile communication
IoT networks
sensors
telecommunication security
cognitive radio
wireless channels
adversarial system utility components
collaborative adversarial modeling
collaborative attacks
collaborative group
collaborative selfish adversaries
biblio
Identity management using blockchain for cognitive cellular networks
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
pubcrawl
integrated circuits
network signaling traffic
opportunistic network access technologies
Performance
privacy
privacy-enhancing user identity management system
Protocols
pseudonymous identities
Identity management
radio spectrum management
Resiliency
Scalability
spectrum crunch
telecommunication network management
telecommunication security
telecommunication signalling
telecommunication traffic
Cloud Computing
assertion
authentication
authorization
blockchain
blockchain technology
Cellular networks
cellular radio
cloud-centric cognitive cellular networks
accounting
cognitive cellular network blockchain
cognitive radio
contracts
Cryptography
dynamic spectrum access
end-to-end management
Human behavior
biblio
P2-SAS: Preserving Users' Privacy in Centralized Dynamic Spectrum Access Systems
Submitted by grigby1 on Thu, 05/18/2017 - 1:44pm
composability
dynamic spectrum access
Dynamical Systems
manet privacy
Metrics
paillier cryptosystem
pubcrawl
Resiliency
secure multi-party computation