Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless networks
biblio
Fault Tolerance and Security in Forwarding Packets Using Game Theory
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
price of anarchy
wireless sensor networks
wireless networks
wireless mesh networks
Waste materials
telecommunication security
telecommunication network reliability
self organized wireless network
security
Scalability
Relays
radio networks
pubcrawl
Ad hoc networks
Predictive Metrics
Nash Equilibrium
Mesh networks
Human Factors
game theory
game theoretic security
forwarding packet security
forwarding packet fault tolerance
fault tolerance
cooperation strategy
cooperation stimulation
biblio
Securing IS assets through hacker deterrence: A case study
Submitted by aekwall on Wed, 12/18/2019 - 2:36pm
wireless networks
internal threat deterrence
information systems security
hacker deterrence
external threat deterrence
external computer criminals
e-commerce organization
cyber attack
broken windows theory
Deterrence
electronic commerce
Computer crime
Computers
Information systems
resilience
Companies
Computer hacking
pubcrawl
Human behavior
Scalability
computer network security
biblio
Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
source information
resilience
Resiliency
secondary cooperative node
secrecy outage probability
security
Security analysis
Signal to noise ratio
SOP
Relays
telecommunication security
tight lower bound expression
transmission secrecy performance
transmit power
untrusted energy-limited secondary cooperative user
untrusted relaying
untrusted secondary user
wireless networks
primary transmission security
Cognitive Radio Security
diversity reception
Maximum ratio combining
maximum ratio combining scheme
MRC scheme
overlay cognitive wireless networks
physical layer security
power system reliability
cognitive radio
primary user information secrecy performance
primary user information security
probability
programmable logic arrays
pubcrawl
radio transmitters
relay links
biblio
Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
resilience
neural nets
Neural networks
optimal MAC strategy
Policy
Policy Based Governance
policy governance
prior knowledge
pubcrawl
radio networks
network layers
Resiliency
Robustness
share spectrum
telecommunication computing
time division multiple access
time-slotted networks
traditional reinforcement learning
universal MAC protocol
wireless networks
DRL algorithmic framework
clean-slate design
collaboration
convergence
DARPA SC2
deep reinforcement learning
deep-reinforcement learning multiple access
design framework
DLMA
DRL agent
clean slate
heterogeneous wireless networks
Human behavior
Human Factors
learning (artificial intelligence)
MAC design
machine learning
machine-learning technique
Media Access Protocol
Metrics
biblio
Joint Channel Coding and Cooperative Network Coding on PSK Constellations in Wireless Networks
Submitted by aekwall on Mon, 11/25/2019 - 2:07pm
cooperative network coding
symbol error rate
RS channel codes
RS channel coded messages
relay
Reed-Solomon codes
Reed-Solomon channel coding
Reed-Solomon channel codes
PSK modulation
PSK constellations
Phase shift keying
nonbinary PSK modulated signals
network configuration
M−PSK modulation
joint error correction
joint channel coding
Resiliency
channel decoding
bit-level exclusive OR operation
wireless networks
relay networks (telecommunication)
network coding
error correction codes
encoding
Relays
error statistics
channel coding
Decoding
Metrics
composability
pubcrawl
biblio
Performance Analysis of Channel Coding Techniques for Cooperative Adhoc Network
Submitted by aekwall on Mon, 11/25/2019 - 2:06pm
low-density parity-check coding
wireless networks
turbo coding
Resiliency
Relays
relay networks (telecommunication)
Rayleigh fading channels
Rayleigh channels
quadrature amplitude modulation
pubcrawl
parity check codes
noise power spectral density
network coding
Metrics
Ad hoc networks
error statistics
Decode and Forward
cooperative communication
cooperative ad hoc network
convolutional coding
Conferences
composability
channel coding techniques
channel coding
channel capacity
Bit error rate
AWGN channels
additive white Gaussian noise
biblio
Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication
Submitted by grigby1 on Mon, 08/26/2019 - 11:10am
pubcrawl
ZigBee packets
Zigbee
wireless sensor networks
wireless networks
wireless LAN
Wireless fidelity
Wi-Fi devices
telecommunication security
spoofing attack detection
RSSI
RSS
Resiliency
resilience
received signal strength
authentication mechanism
physical layer information
Physical layer
packet radio networks
ISM band
heterogeneous wireless networks
heterogeneous wireless devices
frequency 2.4 GHz
CTC schemes
cross-technology communication
Cross Layer Security
composability
Communication system security
collaborative mechanism
biblio
Wireless Security Audit Penetration Test Using Raspberry Pi
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
Scalability
wireless technology
wireless security audit
Wireless Protected Access
wireless networks
wireless LAN
Wireless fidelity
Wired Equivalent Privacy
WiFi testing tools
WiFi network
WiFi Auditor
WiFi attacks
tools
telecommunication security
Security Audits
auditing
Resiliency
resilience
Raspberry Pi 3 module
pubcrawl
Penetration Testing
penetration tester
man in the middle
Jamming
Human Factors
Human behavior
deliberate jamming
Communication system security
authorized wireless communications
authorisation
biblio
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
security
Q-learning based detection scheme
received ambient signal properties
Received signal strength indicator
reinforcement learning technique
resilience
Resiliency
roadside units
rogue edge attacks
rogue edge node
RSSI
RSUs
Scalability
pubcrawl
serving edge
shared ambient radio
signal detection
source media access control address
spoofing detection
telecommunication computing
telecommunication security
test threshold
VANET model
vehicular ad hoc networks
wireless networks
learning (artificial intelligence)
ambient radio signals
authentication
composability
detection error rate reduction
detection scheme
dynamic VANET
edge computing
edge detection
Image edge detection
indoor radio
indoor wireless networks
large-scale network infrastructure
access protocols
learning-based rogue edge detection
MAC address
man-in-the-middle attacks
Metrics
mobile device
Mobile handsets
OBUs
onboard units
optimal detection policy
PHY-layer rogue edge detection scheme
physical-layer rogue edge detection
biblio
Compressed Sensing based Intrusion Detection System for Hybrid Wireless Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
Logic gates
wireless networks
wireless mesh networks
sparse signal reconstruction
sparse original signals
signal reconstruction
resilience
pubcrawl
power consumption
PHY layer
Peer-to-peer computing
Overhead
Metrics
Measurement
active state metric
intrusion detection system
Intrusion Detection
hybrid WMN
hybrid wireless mesh networks
high detection overhead
energy consumption
detecting intrusions
computer network security
compressive sampling
compressive sampled data
compressed sensing theory
compressed sensing
composability
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »