Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CRN
biblio
Random-Byzantine Attack Mitigation in Cognitive Radio Networks using a Multi-Hidden Markov Model System
Submitted by grigby1 on Fri, 09/18/2020 - 12:57pm
radiofrequency interference
Cognitive Radio Security
television frequency spectrum
secondary users
random-Byzantine Attack mitigation
primary user emulation attack
multiHidden Markov Model system
Cognitive Radios
cognitive radio networks
byzantine attacks
CRN
pubcrawl
white space
signal detection
radio spectrum management
cognitive radio
HMM
Hidden Markov models
wireless channels
telecommunication security
Resiliency
resilience
biblio
A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
fusion center
AF-CSSCRN security
Amplify-and-Forward
amplify-and-forward cooperative spectrum sensing
antenna arrays
average secrecy rate
cognitive relay
CRN
external malicious threats
fifth-generation systems
AF-CSS
Geometry
multiple antennas
secondary users
secure communication
secure transmission
spectrum sensing data
stochastic geometry
Cognitive Radio Security
physical layer security
resilience
Resiliency
telecommunication security
5G mobile communication
sensor fusion
Communication system security
Stochastic processes
cooperative communication
pubcrawl
cognitive radio
radio spectrum management
signal detection
amplify and forward communication
Cognitive Radio Network
cognitive radio networks
5G systems
access points
biblio
A Flexible Anti-Jamming Channel Hopping for Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 9:56am
LAA scheme
wireless channels
traffic load
Topology
Throughput
telecommunication security
SU node
Resiliency
resilience
pubcrawl
Protocols
Oceans
Load modeling
load awareness anti-jamming channel hopping scheme
anti-jamming channel hopping protocol
Jamming
frequency hop communication
flexible anti-jamming channel hopping
Extended Langford pairing (ELP)
CRN
computer science
Cognitive Radio Security
Cognitive radio networks (CRNs)
cognitive radio networks
cognitive radio
channel hopping sequences
Anti-jamming strategy
biblio
Primary User Authentication in Cognitive Radio Network Using Pre-Generated Hash Digest
Submitted by grigby1 on Thu, 12/05/2019 - 9:56am
pregenerated hash digest
telecommunication security
sensors
Resiliency
resilience
radio networks
PUEA
pubcrawl
primary user emulation attack
primary user authentication
authentication
node authentication
emulation
Cryptography
CRN
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
Base stations
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 12:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 10:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
biblio
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory
Submitted by K_Hooper on Wed, 12/20/2017 - 10:29am
inference mechanisms
uncertainty handling
telecommunication computing
sensors
security of data
Safety
Resiliency
Reliability
pubcrawl
local IDS agent
local detection decisions
Intrusion Detection
Base stations
IDS Agent
distributed intrusion detection system
Dempster-Shafer's evidence theory
Dempster-Shafer evidence theory
Data collection
D-S evidence theory
CRN
cooperative detection center
Cognitive Radio Security
cognitive radio networks
cognitive radio