Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cognitive Radio Security
biblio
Primary User Authentication in Cognitive Radio Network Using Pre-Generated Hash Digest
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pregenerated hash digest
telecommunication security
sensors
Resiliency
resilience
radio networks
PUEA
pubcrawl
primary user emulation attack
primary user authentication
authentication
node authentication
emulation
Cryptography
CRN
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
Base stations
biblio
Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
source information
resilience
Resiliency
secondary cooperative node
secrecy outage probability
security
Security analysis
Signal to noise ratio
SOP
Relays
telecommunication security
tight lower bound expression
transmission secrecy performance
transmit power
untrusted energy-limited secondary cooperative user
untrusted relaying
untrusted secondary user
wireless networks
primary transmission security
Cognitive Radio Security
diversity reception
Maximum ratio combining
maximum ratio combining scheme
MRC scheme
overlay cognitive wireless networks
physical layer security
power system reliability
cognitive radio
primary user information secrecy performance
primary user information security
probability
programmable logic arrays
pubcrawl
radio transmitters
relay links
biblio
HCOBASAA: Countermeasure Against Sinkhole Attacks in Software-Defined Wireless Sensor Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
probability of false negative
wireless sensor networks
telecommunication security
software-defined wireless sensor cognitive radio network
Sinkhole attack
sink node
sensor nodes
Resiliency
resilience
pubcrawl
probability of false positive
Base stations
probability of detection
Performance Metrics
Hop Count-Based Sinkhole Attack detection Algorithm
HCOBASAA
detection algorithms
Databases
Communication system security
Cognitive Radio Security
cognitive radio
change in position
biblio
Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
PUE attack
unused spectrum
total error reduction
total error probability
telecommunication security
spectrum sensing interval
Signal to noise ratio
sensors
security issues
secondary users
Resiliency
resilience
radio transmitters
radio spectrum management
attacker strength
pubcrawl
probability
primary user spectrum bands
primary user emulation attack
Neyman-Pearson criterion
malicious user
error probability
energy detector
emulation
emulated primary signal
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
biblio
RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless channels
Transmitters
telecommunication security
Signal to noise ratio
RSS-based localization method
RSS-based localization
Resiliency
resilience
Receivers
radiofrequency interference
radio spectrum management
PUE attacker detection
cognitive radio
primary user signals
primary user emulation attacker
primary user emulation attack
mobile users
mobile radio
maximum likelihood estimation
Mathematical model
licensed users
emulation
cognitive radio technology
Cognitive Radio Security
cognitive radio networks
biblio
The Detection of the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
unlicensed cognitive devices
telecommunication security
spectrum sensing data falsification attack
spectrum scarcity challenges
spectrum observations
spectrum band
signal detection
sensors
Resiliency
resilience
q-out-of-m rule scheme
Ad hoc networks
performance evaluation
modified Z-test
Licenced users
fading channels
Decision Making
Copper
Cognitive Radios
cognitive radio technology
Cognitive Radio Security
cognitive radio ad hoc networks
cognitive radio
biblio
The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-Hoc Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless network systems
underutilized spectrum
telecommunication security
spectrum congestion
spectrum bands
signal detection
sensors
security measure
security
Resiliency
resilience
radio spectrums
radio spectrum management
Radio spectrum
Ad hoc networks
network leading interference
legitimate cognitive radios
Interference
data communications
cooperative communication
Consensus algorithm
Cognitive Radio Security
cognitive radio ad-hoc networks
cognitive radio
Cascading style sheets
byzantine attack mitigation scheme
byzantine attack
attack-proof cooperative spectrum sensing
biblio
Analogous Study of Security Threats in Cognitive Radio
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless sensor networks
wireless security threat issue
Wireless communication
white space
telecommunication security
SSDF
spectrum sensing data falsification
signal detection
sensors
sensor fusion
security
Resiliency
resilience
radio spectrum management
PUE
cognitive radio
Primary user Emulation
Jamming
Interference
Fusion Techniques
fusion technique
electromagnetic spectrum band
Electromagnetic spectrum
Data integration
CRWSN
Cooperative Spectrum Sensing and Spectrum Sensing Data Falsification (SSDF)
cooperative spectrum sensing
cooperative communication
cognitive radio wireless sensor networks
Cognitive Radio Security
Cognitive Radio (CR)
biblio
Secrecy Outage Performance for Dual-Hop Underlay Cognitive Radio System over Nakagami-m Fading
Submitted by grigby1 on Wed, 11/27/2019 - 2:59pm
cognitive radio networks
Cognitive Radio Security
composability
maximal-ratio combining
Metrics
Nakagami-m fading channels
physical layer security
pubcrawl
resilience
Resiliency
secrecy outage probability
biblio
Enhancing secrecy by full-duplex antenna selection in cognitive networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
power system reliability
transmitting antennas
telecommunication security
secrecy outage probability
secondary users
secondary eavesdropping network
Resiliency
receiving antennas
radio network secrecy enhancement
pubcrawl
probability
antenna arrays
physical layer security
Jamming
full-duplex antenna selection
full-duplex
full duplex communication
Cognitive Radio Security
cognitive radio
cognitive networks
antenna selection
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »