Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secondary users
biblio
A Survey on Byzantine Attack using Secure Cooperative Spectrum Sensing in Cognitive Radio Sensor Network
Submitted by aekwall on Fri, 04/28/2023 - 8:40am
security
sensors
Task Analysis
Reliability
pubcrawl
threats
Resiliency
byzantine attack
cognitive radio
cognitive radio sensor networks
Cooperative
primary users
radio spectrum management
secondary users
spectrum sensing
Cognitive Radio Security
biblio
Optimized Spectrum sensing Techniques for Enhanced Throughput in Cognitive Radio Network
Submitted by aekwall on Mon, 03/15/2021 - 11:02am
added delay
Cognitive Radio Security
wireless communication system
wireless applications
transmission delay
throughput optimization
spectrum scarcity
Sensing throughput tradeoff
secondary users
primary users security
optimized spectrum sensing techniques
optimal sensing time
finite resource
enhanced throughput
Cooperative Spectrum Sensing(CSS)
Cognitive Radio Network
software defined radio
cognitive radio networks
cognitive radio
signal quality
radio spectrum management
Cascading style sheets
signal detection
Throughput
sensors
software radio
radio networks
Signal to noise ratio
optimization
pubcrawl
Resiliency
biblio
Random-Byzantine Attack Mitigation in Cognitive Radio Networks using a Multi-Hidden Markov Model System
Submitted by grigby1 on Fri, 09/18/2020 - 12:57pm
radiofrequency interference
Cognitive Radio Security
television frequency spectrum
secondary users
random-Byzantine Attack mitigation
primary user emulation attack
multiHidden Markov Model system
Cognitive Radios
cognitive radio networks
byzantine attacks
CRN
pubcrawl
white space
signal detection
radio spectrum management
cognitive radio
HMM
Hidden Markov models
wireless channels
telecommunication security
Resiliency
resilience
biblio
A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
fusion center
AF-CSSCRN security
Amplify-and-Forward
amplify-and-forward cooperative spectrum sensing
antenna arrays
average secrecy rate
cognitive relay
CRN
external malicious threats
fifth-generation systems
AF-CSS
Geometry
multiple antennas
secondary users
secure communication
secure transmission
spectrum sensing data
stochastic geometry
Cognitive Radio Security
physical layer security
resilience
Resiliency
telecommunication security
5G mobile communication
sensor fusion
Communication system security
Stochastic processes
cooperative communication
pubcrawl
cognitive radio
radio spectrum management
signal detection
amplify and forward communication
Cognitive Radio Network
cognitive radio networks
5G systems
access points
biblio
TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band
Submitted by aekwall on Mon, 04/13/2020 - 9:21am
spectrum databases
Federal Communications Commission
frequency 150.0 MHz
frequency 3.5 GHz
gallium arsenide
seamless spectrum
secondary users
sensitive operational information
Spectrum access system
spectrum availability
FCC regulatory design requirements
spectrum demand
spectrum usage
SU privacy issues
Synthetic aperture sonar
TrustSAS
trustworthy framework
trustworthy spectrum access system
Trustworthy Systems
blockchain technology
data privacy
telecommunication security
Resiliency
pubcrawl
composability
privacy
Peer-to-peer computing
blockchain
Databases
Cryptography
radio spectrum management
cyber physical systems
broadband networks
CBRS band
citizens broadband radio service
cryptographic techniques
dynamic spectrum access system
FCC
biblio
Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network
Submitted by grigby1 on Thu, 12/05/2019 - 9:55am
PUE attack
unused spectrum
total error reduction
total error probability
telecommunication security
spectrum sensing interval
Signal to noise ratio
sensors
security issues
secondary users
Resiliency
resilience
radio transmitters
radio spectrum management
attacker strength
pubcrawl
probability
primary user spectrum bands
primary user emulation attack
Neyman-Pearson criterion
malicious user
error probability
energy detector
emulation
emulated primary signal
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 12:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
Enhancing secrecy by full-duplex antenna selection in cognitive networks
Submitted by K_Hooper on Wed, 12/20/2017 - 10:29am
power system reliability
transmitting antennas
telecommunication security
secrecy outage probability
secondary users
secondary eavesdropping network
Resiliency
receiving antennas
radio network secrecy enhancement
pubcrawl
probability
antenna arrays
physical layer security
Jamming
full-duplex antenna selection
full-duplex
full duplex communication
Cognitive Radio Security
cognitive radio
cognitive networks
antenna selection
biblio
Location privacy preserving protocols in database-enabled cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 10:29am
Resiliency
wireless users
wireless spectrum
wireless services
Wireless communication
traffic redirection
telecommunication traffic
telecommunication security
SU location privacy
SU
spectrum utilization
spectrum availability
spectral availability
secondary users
Schedules
cognitive radio
pubcrawl
Protocols
privacy
mobile devices
master device enabled location privacy preserving scheme
location privacy preserving protocols
geolocation database
Databases
database enabled wireless networks
database enabled cognitive radio networks
data privacy
crowd sourced location privacy preserving scheme
Communication system security
Cognitive Radio Security