Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cognitive Radio Security
biblio
Secrecy outage probability of full-duplex networks with cognitive radio environment and partial relay selection
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
pubcrawl
underlay cognitive radio networks
Transmitters
Telecommunications
signal processing
secrecy outage probability
Resiliency
Relays
relay networks (telecommunication)
receiving antennas
cognitive radio
Protocols
probability
partial relay selection
multiple relays selection
full-duplex networks
decode-and-forward relay selection
decode and forward communication
Cognitive Radio Security
cognitive radio environment
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
biblio
Location privacy preserving protocols in database-enabled cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
Resiliency
wireless users
wireless spectrum
wireless services
Wireless communication
traffic redirection
telecommunication traffic
telecommunication security
SU location privacy
SU
spectrum utilization
spectrum availability
spectral availability
secondary users
Schedules
cognitive radio
pubcrawl
Protocols
privacy
mobile devices
master device enabled location privacy preserving scheme
location privacy preserving protocols
geolocation database
Databases
database enabled wireless networks
database enabled cognitive radio networks
data privacy
crowd sourced location privacy preserving scheme
Communication system security
Cognitive Radio Security
biblio
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
inference mechanisms
uncertainty handling
telecommunication computing
sensors
security of data
Safety
Resiliency
Reliability
pubcrawl
local IDS agent
local detection decisions
Intrusion Detection
Base stations
IDS Agent
distributed intrusion detection system
Dempster-Shafer's evidence theory
Dempster-Shafer evidence theory
Data collection
D-S evidence theory
CRN
cooperative detection center
Cognitive Radio Security
cognitive radio networks
cognitive radio
biblio
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
Resiliency
probability
PU
PU-PUE
pubcrawl
PUE attacker
PUE position
received signal strength indication
Received signal strength indicator
primary user emulation attack localization
risk management
RSSI
telecommunication security
Trilateration
trilateration technique
uncertainty
wireless sensor networks
Bayes methods
Primary user Emulation
physical network layer coding
network coding
lost function
licensed channel
DoS attack
deny-of-service attack
decision theory
conditional probability
Cognitive Radio Security
cognitive radio networks
cognitive radio
Channel estimation
Bayesian decision theory
Bayesian decision model
biblio
Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network
Submitted by K_Hooper on Wed, 12/20/2017 - 11:28am
Channel estimation
cognitive radio
Cognitive Radio Security
Indexes
network security
pubcrawl
Resiliency
sensors
biblio
Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications
Submitted by K_Hooper on Wed, 12/20/2017 - 11:28am
proactive jamming attacks
Wireless communication
time-critical data delivery
time-critical applications
Time factors
telecommunication security
telecommunication channels
sensors
security-aware channel assignment
security
Resiliency
pubcrawl
probabilistic spectrum assignment algorithm
Channel allocation
jamming attacks
Jamming
IoT-based CRN
IoT-based cognitive radio networks
Internet of Things
fading conditions
delays
cognitive radio transmission
Cognitive Radio Security
cognitive radio
channel assignment problem
biblio
Combined sensing, performance and security trade-offs in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:28am
Cognitive Radio Networks(CRN)
Cognitive Radio Security
encryption
Mathematical model
Measurement
Performance Metrics
Primary User(PU)
pubcrawl
Resiliency
Secondary User (SU)
Security Control
sensors
Throughput
biblio
Evaluating physical-layer security for secondary users in cognitive radio systems with attackers
Submitted by K_Hooper on Wed, 12/20/2017 - 11:28am
Bandwidth
Cognitive Radio Security
Interference
Jamming
pubcrawl
Radio frequency
Resiliency
security
sensors
Wireless communication
biblio
Physical layer security of non-orthogonal multiple access in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:28am
Cognitive Radio Security
Interference
network security
NOMA
non-orthogonal multiple access
Physical layer
physical layer security
power system reliability
probability
pubcrawl
Resiliency
underlay cognitive radio
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »