Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Jamming
biblio
Physical-Layer Security of Visible Light Communications with Jamming
Submitted by aekwall on Mon, 07/13/2020 - 10:16am
PLS scheme
Wireless communication
Visual Light Communications Security
visible light communications
visible light communication
uniform distribution
truncated generalized normal distribution
telecommunication security
signal processing
security
secrecy rate
Scalability
Resiliency
Radio frequency
pubcrawl
Entropy
physical-layer security
Photodetectors
normal distribution
multiple eavesdroppers
Metrics
light emitting diodes
jamming LED
Jamming
input signal
indoor VLC system
indoor communication
free-space optical communication
Exponential distribution
biblio
A Fully Adaptive Lattice-based Notch Filter for Mitigation of Interference in GPS
Submitted by grigby1 on Fri, 07/03/2020 - 4:05pm
intentional interference
Signal to noise ratio
Scalability
Satellites
Resiliency
resilience
Receivers
pubcrawl
notch frequency
notch filters
notch filter structures
narrowband interference
Lattice-Based Notch Filter
Jamming
Interference
adaptive filters
Human behavior
GPS specific applications
GPS receivers
GPS modelling platform
Global Positioning System
Global Navigation Satellite Systems
fully adaptive lattice-based notch filter
direct form second order
Deterrence
Bandwidth
Anti-jamming
adaptive notch filtering
Adaptive Notch Filter
biblio
Data Conformity Evaluation: A Novel Approach for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
L1-norm
wireless sensor networks
tensors
tensor decomposition
telecommunication network topology
star topology network
security
Scalability
Resiliency
pubcrawl
principal-component-analysis
network topology
Metrics
blind attack detection method
Jamming
Iterative methods
IoT security
IoT networks
Internet of Things
Image edge detection
edge detection
data conformity evaluation
data conformity
computer network security
composability
biblio
Securing a Wireless Network-on-Chip Against Jamming Based Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/11/2020 - 10:09am
persistent jamming attack
internal hardware Trojans
jamming attack
low-power transceivers
ML classifiers
network-on-chip communications
NoC switches
nonscalable multihop data transmission paths
On chip interconnect
On chip security
on-chip data transfer
on-chip wireless medium
denial-of-service attacks
radio transceivers
radiofrequency interconnections
random burst error correction code
Switches
switching networks
WiNoC security
wired NoC architectures
wireless interconnection
Wireless NoC
wireless NoC architectures
network on chip security
system-on-chip
telecommunication security
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Wireless communication
Metrics
machine learning
telecommunication network routing
telecommunication computing
radio networks
Scalability
DoS
Hardware Security
error correction codes
radiofrequency interference
DoS attack
Jamming
denial-of-service attack
machine learning classifier
HT
network-on-chip
data transfer security threats
biblio
L2 Control for Networked Control Systems Subject to Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
DoS jamming attacks
Networked Control Systems Security
Un-known Periodic Dos Jamming Attacks
trigger parameters
time-varying systems
switching system model
state feedback controller
state feedback
piecewise Lyapunov function
linear matrix inequalities
L2 control
Jamming
exponential stability analysis
event-triggering mechanism
telecommunication security
Denial of Service jamming attacks
Control Theory
Asymptotic stability
control system synthesis
Symmetric matrices
Lyapunov methods
stability
networked control systems
Predictive Metrics
control engineering computing
composability
pubcrawl
Resiliency
biblio
Turing Meets Shannon: On the Algorithmic Computability of the Capacities of Secure Communication Systems (Invited Paper)
Submitted by grigby1 on Wed, 03/04/2020 - 3:15pm
active jammer
algorithmic computability
capacity expressions
communication scenarios
composability
Compositionality
Jamming
private key cryptography
pubcrawl
secret key generation
secure communication systems
theoretical cryptography
wiretap channel
biblio
A Flexible Anti-Jamming Channel Hopping for Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 9:56am
LAA scheme
wireless channels
traffic load
Topology
Throughput
telecommunication security
SU node
Resiliency
resilience
pubcrawl
Protocols
Oceans
Load modeling
load awareness anti-jamming channel hopping scheme
anti-jamming channel hopping protocol
Jamming
frequency hop communication
flexible anti-jamming channel hopping
Extended Langford pairing (ELP)
CRN
computer science
Cognitive Radio Security
Cognitive radio networks (CRNs)
cognitive radio networks
cognitive radio
channel hopping sequences
Anti-jamming strategy
biblio
Analogous Study of Security Threats in Cognitive Radio
Submitted by grigby1 on Thu, 12/05/2019 - 9:55am
pubcrawl
wireless sensor networks
wireless security threat issue
Wireless communication
white space
telecommunication security
SSDF
spectrum sensing data falsification
signal detection
sensors
sensor fusion
security
Resiliency
resilience
radio spectrum management
PUE
cognitive radio
Primary user Emulation
Jamming
Interference
Fusion Techniques
fusion technique
electromagnetic spectrum band
Electromagnetic spectrum
Data integration
CRWSN
Cooperative Spectrum Sensing and Spectrum Sensing Data Falsification (SSDF)
cooperative spectrum sensing
cooperative communication
cognitive radio wireless sensor networks
Cognitive Radio Security
Cognitive Radio (CR)
biblio
Phase Jamming Attack: A Practical Attack on Physical Layer-Based Key Derivation
Submitted by grigby1 on Wed, 11/27/2019 - 2:01pm
physical layer security
Wireless communication
Signal to noise ratio
security enhancement performance
security
secret keys
secret key generation
Resiliency
resilience
received signal phase quantisation
Quantization (signal)
pubcrawl
probability
physical-layer security
physical layer-based key derivation procedure
adversary signal transmission
Physical layer
phase quantization regions
phase jamming attack
phase attack
Metrics
key generation technique
jamming attack
Jamming
Cryptography
composability
Communication system security
communication management
communication channel networks
biblio
Wireless Security Audit Penetration Test Using Raspberry Pi
Submitted by grigby1 on Mon, 07/01/2019 - 9:03am
Scalability
wireless technology
wireless security audit
Wireless Protected Access
wireless networks
wireless LAN
Wireless fidelity
Wired Equivalent Privacy
WiFi testing tools
WiFi network
WiFi Auditor
WiFi attacks
tools
telecommunication security
Security Audits
auditing
Resiliency
resilience
Raspberry Pi 3 module
pubcrawl
Penetration Testing
penetration tester
man in the middle
Jamming
Human Factors
Human behavior
deliberate jamming
Communication system security
authorized wireless communications
authorisation
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »