Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
legitimate user
biblio
Analysis of Local Secure Connectivity of Legitimate User in Stochastic Wireless Networks
Submitted by grigby1 on Fri, 11/20/2020 - 1:52pm
secure connection probability
Rayleigh channels
corresponding isolated secure probability
density ratio
eavesdropper collusion
isolated security probability
legitimate user
local secure connectivity
Rayleigh fading
physical layer security
secure wireless communication
secure wireless connection
stochastic networks
stochastic wireless networks
wireless channel conditions
wireless channel fading
Stochastic Computing Security
wireless channels
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Communication system security
radio networks
Receivers
security
wireless networks
Stochastic processes
probability
Monte-Carlo simulation
Monte Carlo methods
Transmitters
fading channels
biblio
Impact of multipath reflections on secrecy in VLC systems with randomly located eavesdroppers
Submitted by grigby1 on Mon, 01/21/2019 - 12:21pm
light reflection
Visible Light Communications Security
VLC systems
stochastic geometry
Stimulated emission
secrecy viewpoint
secrecy outage probability
reflection
reflected light
randomly located eavesdroppers
randomly distributed eavesdroppers
probability
PLS
multipath reflections
Monte Carlo simulations
Monte Carlo methods
pubcrawl
light emitting diode configuration
legitimate user
legitimate information
free-space optical communication
physical layer security
optical transmitters
optical receivers
light emitting diodes
visible light communication
Signal to noise ratio
telecommunication security
Geometry
Scalability
Resiliency
Metrics
biblio
A MIMO cross-layer secure communication scheme based on spatial modulation
Submitted by grigby1 on Wed, 01/10/2018 - 12:21pm
multiple input multiple output system
upper layer stream cipher
transmitting antennas
telecommunication security
spatial modulation
security information transmission
security
Resiliency
reception demodulation performance
Receivers
radio reception
pubcrawl
physical layer security
Physical layer
Bit error rate
modulation
MIMO cross-layer secure communication scheme
MIMO communication
MIMO
legitimate user
eavesdropper error rate
distorted signal design
Demodulation
Cryptography
Cross-Layer Security
Cross Layer Security
composability
biblio
Security beamforming algorithms in multibeam satellite systems
Submitted by grigby1 on Wed, 12/20/2017 - 12:59pm
BF weight vectors
signal processing security
ZF BF algorithm
zero-forcing BF algorithms
zero-forcing
the sum of achievable secrecy rate
SLNR BF algorithm
signal-to-leakage-and-noise ratio
security beamforming algorithms
satellite communication
power allocation coefficients
optimization problem
on-board satellite transmit power constraint
multibeam satellite communication system
multibeam satellite
legitimate user
security
achievable secrecy rate
Signal to noise ratio
Satellites
Satellite broadcasting
telecommunication security
array signal processing
physical layer security
Interference
optimization
optimisation
composability
privacy
Resiliency
pubcrawl
Metrics
biblio
A Graphical Password Authentication for analyzing legitimate user in online social network and secure social image repository with metadata
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
meta data
uploaded images
social networking (online)
Social network services
Security Policies Analysis
secure social image repository
pubcrawl
privacy
policy-based governance
online social network
multimedia information sharing
metadata
Meta Data Stratification
alphanumeric textbased password
legitimate user
internet
hassle-free privacy setting
Graphical Password authentication
flaw points
Databases
data privacy
Computer hacking
collaboration
automatic policy prediction
authorisation
authentication