Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SOP
biblio
On Security Capability of Cooperative Communications in Energy Scavenging Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
relay networks (telecommunication)
Cognitive Radio Security
precise closed-form formula
power division
noncognitive networks
message recovering time
Manganese
ESCRNs
energy scavenging time
energy scavenging cognitive radio networks
energy scavenging
cooperative communications
SOP
secrecy outage
security
secrecy outage probability
cognitive radio
energy harvesting
Interference
Relays
cooperative communication
telecommunication network reliability
telecommunication power management
Analytical models
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Security Analysis for Cognitive Radio Network with Energy Scavenging Capable Relay over Nakagami-m Fading Channels
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
Cognitive Radio Network
Cognitive Radio Security
underlay cognitive network
SOP
secrecy outage
relay networks (telecommunication)
power constraints
Nakagami-m fading channels
Nakagami-m
energy scavenging capable relay
energy scavenging
closed-form expression
secrecy outage probability
relaying
Nakagami channels
security
cognitive radio
information processing
energy harvesting
Relays
fading channels
telecommunication network reliability
probability
Decoding
Security analysis
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Secrecy Outage Probability Analysis for Visible Light Communications with SWIPT and Random Terminals
Submitted by aekwall on Mon, 07/13/2020 - 10:18am
SWIPT
random terminals
Resiliency
Scalability
secrecy outage probability analysis
secrecy performance
security
simultaneous wireless information and power transfer
SOP
random channel characteristics
System performance
telecommunication power management
telecommunication security
telecommunication terminals
transmitter
typical indoor VLC system
Visual Light Communications Security
wireless channels
optical receivers
free-space optical communication
indoor communication
indoor visible light communications
inductive power transmission
information receiver
light emitting diodes
lower bound
Metrics
energy receiver
passive information eavesdropper
physical-layer data
physical-layer data secure transmission
power system reliability
probability
Probability density function
pubcrawl
radiofrequency power transmission
biblio
Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
Submitted by grigby1 on Thu, 12/05/2019 - 9:56am
source information
resilience
Resiliency
secondary cooperative node
secrecy outage probability
security
Security analysis
Signal to noise ratio
SOP
Relays
telecommunication security
tight lower bound expression
transmission secrecy performance
transmit power
untrusted energy-limited secondary cooperative user
untrusted relaying
untrusted secondary user
wireless networks
primary transmission security
Cognitive Radio Security
diversity reception
Maximum ratio combining
maximum ratio combining scheme
MRC scheme
overlay cognitive wireless networks
physical layer security
power system reliability
cognitive radio
primary user information secrecy performance
primary user information security
probability
programmable logic arrays
pubcrawl
radio transmitters
relay links
biblio
Using friendly jamming to improve route security and quality in ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
security performance
pubcrawl
Receivers
Resiliency
route security
Routing
secrecy outage probability
security
Security Metrics
physical layer security technique
service quality metrics
Signal to noise ratio
SOP
telecommunication network reliability
telecommunication network routing
telecommunication security
wireless area network
eavesdroppers
Ad hoc networks
auxiliary variable
composability
connection outage probability
convex optimization problem
convex programming
COP
D2D network
Ad Hoc Network Security
friendly jamming
Human behavior
Human Factors
Interference
Jamming
machine-to-machine communication
Measurement