Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Jamming
biblio
Interactive message transmission over adversarial wiretap channel II
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
Scalability
Policy
Protocols
pubcrawl
public key infrastructure
quantum computers
Random variables
Reliability
Resiliency
perfectly secure protocol family
security
telecommunication security
two-way wiretap II channel
Upper bound
wireless channels
wireless setting
Wyner wiretap II model
information theoretic security
adversarial noise
adversarial wiretap channel II
collaboration
composability
Conferences
Cryptographic Protocols
Human behavior
human factor
active adversary
interactive message transmission
interactive protocols
Jamming
jamming signal
Metrics
Mobile communication
perfect information theoretic security
biblio
Implementation of GPS signal simulation for drone security using Matlab/Simulink
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
signal data
Jamming
Mathematical model
noise models
P code
radio receivers
radiofrequency interference
Satellite broadcasting
Satellites
IF GPS signal
signal processing
signal processing algorithm
Signal to noise ratio
Signal-to-noise ratio (SNR)
simulated signals
simulation model
spoofing-jamming interference
signal processing security
Drone security
pubcrawl
Resiliency
privacy
composability
Radiation detectors
Generators
carrier-to-noise ratio estimation
digital intermediate frequency GPS signal
Metrics
drone security applications
Global Positioning System
GPS receivers
GPS signal generator
GPS signal simulation
GPS spoofing signal generation
IF (intermediate frequency) signals
biblio
An improved cooperative jamming strategy for PHY security in a multi-hop communications system
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
cooperative jamming (CJ)
signal processing security
spread spectrum communication
simulation
secrecy capacity
Relays
physical layer (PHY) security
multi-hop communications
Jamming
eavesdropper
security
beamforming
array signal processing
Wireless communication
composability
privacy
Resiliency
pubcrawl
Metrics
biblio
Enhancing secrecy by full-duplex antenna selection in cognitive networks
Submitted by K_Hooper on Wed, 12/20/2017 - 10:29am
power system reliability
transmitting antennas
telecommunication security
secrecy outage probability
secondary users
secondary eavesdropping network
Resiliency
receiving antennas
radio network secrecy enhancement
pubcrawl
probability
antenna arrays
physical layer security
Jamming
full-duplex antenna selection
full-duplex
full duplex communication
Cognitive Radio Security
cognitive radio
cognitive networks
antenna selection
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 10:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
biblio
Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications
Submitted by K_Hooper on Wed, 12/20/2017 - 10:28am
proactive jamming attacks
Wireless communication
time-critical data delivery
time-critical applications
Time factors
telecommunication security
telecommunication channels
sensors
security-aware channel assignment
security
Resiliency
pubcrawl
probabilistic spectrum assignment algorithm
Channel allocation
jamming attacks
Jamming
IoT-based CRN
IoT-based cognitive radio networks
Internet of Things
fading conditions
delays
cognitive radio transmission
Cognitive Radio Security
cognitive radio
channel assignment problem
biblio
Evaluating physical-layer security for secondary users in cognitive radio systems with attackers
Submitted by K_Hooper on Wed, 12/20/2017 - 10:28am
Bandwidth
Cognitive Radio Security
Interference
Jamming
pubcrawl
Radio frequency
Resiliency
security
sensors
Wireless communication
biblio
SDR-Based Resilient Wireless Communications
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
wireless channels
SDR-based resilient wireless communication
security of data
service attacks
session hijacking
software defined radio
Software Defined Radios
software radio
telecommunication security
Scalability
Wireless communication
wireless communications attacks
wireless communications channels
wireless communications secure
wireless networks
wireless protocols
wireless technologies
jamming attacks
Communication system security
Computer crime
cyberattacks
Denial of Service (DoS) Attack
Denial of Service attacks
Frequency modulation
Jamming
jamming attack
Autonomic Security
Metrics
moving target defense
Protocols
pubcrawl
radio channels
Resiliency
Resilient Communication System
biblio
Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security
Submitted by grigby1 on Mon, 11/20/2017 - 11:19am
security
Policy
policy-based governance
pubcrawl
QCQP
QoS constraints
quadratically constrained quadratic problem
quality of service
quality-of-service constraints
Resiliency
SCIP algorithm
physical layer security
sensor nodes
solving constraint integer programs
telecommunication security
total energy consumption
transmitting antennas
virtual MIMO-based cooperative beamforming and jamming
virtual multiinput multioutput communication architecture
Wireless Sensor Network
wireless sensor networks
WSN
cooperative communication
array signal processing
artificial neural network
Artificial Neural Networks
artificial noise
beamforming
beamforming vector optimization
cluster-based cooperative wireless sensor networks
clustered wireless sensor network security
collaboration
computational complexity
antenna
energy consumption
Governance
Government
integer programming
Jamming
jamming vector optimization
MIMO
MIMO communication
MISO
NP-hard problem
biblio
TPM-supported key agreement protocols for increased autonomy in constellation of spacecrafts
Submitted by grigby1 on Mon, 11/13/2017 - 11:00am
pubcrawl
TT&c
trusted platform modules
Trusted Platform Module
TPM-supported key agreement protocols
spacecrafts
Space vehicles
space missions
space communication links
security mechanisms
Resiliency
composability
Protocols
protocol iterations
payload links
opportunistic control center
Jamming
encryption
DH-HEMTs
Cryptographic Protocols
cryptographic keys
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »