Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Jamming
biblio
Self-triggered coordination over a shared network under Denial-of-Service
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
Clocks
Computer crime
computer network security
cyber-physical systems
denial-of-service attacks
DoS attacks
DoS frequency
Jamming
network agents
persistency-of-communication
PoC
pubcrawl170109
self-triggered coordination
shared network
Time-frequency Analysis
Topology
biblio
"Anti-jamming target detection of pulsed-type radars in QuadCS domain"
Submitted by grigby1 on Tue, 02/21/2017 - 12:08pm
pubcrawl170104
target detection scheme
sub-Nyquist sampling
Signal to noise ratio
radiofrequency signals
radar echoes
radar detection
Radar countermeasures
quadrature sampling
quadrature compressive sampling
quadrature components
QuadCS
pulsed-type radars
Bandwidth
object detection
Jamming
jammer leakage
inphase components
Electronic countermeasures
echo
DRFM repeat jammers
digital radio frequency memory repeat jammers
Deceptive electronic-counter measures
CS recovery algorithms
compressed sensing
biblio
"The two-hop interference untrusted-relay channel with confidential messages"
Submitted by grigby1 on Tue, 02/14/2017 - 12:05pm
pubcrawl
wireless channels
untrusted relay node
two hop interference untrusted relay channel
Trusted Computing
telecommunication security
structured codes
stochastic encoding
security
secure rate region
scaled compute-and-forward
Relays
relay networks (telecommunication)
radiofrequency interference
Science of Security
confidential messages
nested lattice codes
message transmission
message destination
Lattices
Jamming
Interference
Gaussian processes
Gaussian codewords
encryption block
encoding
direct links
Decoding
Cryptography
cooperative jamming
biblio
Cyber Maneuvers and Maneuver Keys
Submitted by BrandonB on Tue, 05/05/2015 - 10:20am
computer security
Cryptography
cyber maneuvers
cyber security system
encryption
encryption algorithm
Hardware
Intrusion Detection
Jamming
maneuver keys
moving-target defenses
proactive network change
proactive strategy
reactive network change
secure rekeying
spread-spectrum key
biblio
Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs
Submitted by BrandonB on Tue, 05/05/2015 - 10:18am
moving target defense mechanism
Wireless communication
telecommunication network reliability
tactical cognitive radio MANET
source selective jamming attack combation
source selective jammer block transmission
source MAC address
secure communication
seamless communication
reliable communication
random address assignment
probability
parameter selection
Ad hoc networks
mobile computing
mobile ad hoc networks
military communication
Jamming
interference suppression
flipped address mechanism
delays
computer network security
Communication system security
cognitive radio
address manipulation
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Fri, 05/01/2015 - 7:34am
network capacity
Vectors
Transforms
source rate
secrecy
Robustness
rate-optimal
random linear network coding
random codes
polynomial-time distributed network codes
network coding
Achievable rates
malicious errors
linear codes
Jamming
interior nodes
error probability
error control
eavesdropping
communicating information
communicated message
adversary
biblio
A characterization of uncoordinated frequency hopping for wireless secrecy
Submitted by BrandonB on Fri, 05/01/2015 - 7:16am
spread spectrum communication
wireless transmissions
wireless secrecy
Wireless communication
uncoordinated frequency hopping characterization
Time-frequency Analysis
Throughput
telecommunication security
spread spectrum scheme
communication secrecy level
security
secret-key exchange
radio transmitters
radio receivers
Jamming
Interference
Cryptography
biblio
Impacts of unreliable communication and regret matching based anti-jamming approach in smart grid
Submitted by BrandonB on Fri, 05/01/2015 - 6:49am
Jamming
wireless channels
unreliable wireless communication
smart power grids
Smart Grids
Smart Grid
regret matching
power system management
jamming attack
Algorithm design and analysis
Games
Educational institutions
DRM
demand response management
communication channel
cognitive radio
antijamming attack approach
biblio
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
Submitted by BrandonB on Thu, 04/30/2015 - 1:24pm
spread spectrum systems
primary security threat
probability
radio interference broadcast
radio networks
radiofrequency interference
Receivers
Smart Grid
smart grid application
smart grid communication
Smart Grids
smart power grids
power system security
TACT
telecommunication security
telecommunication traffic
transmitting adaptive camouflage traffic
U-shaped function
well-adopted attack model
wireless communication security
wireless network deployment
wireless networks
worst-case message delay
Jamming
code channel
Communication system security
control messages
cyber-physical system
delay performance guarantee
delays
existing attack model
generic jamming process
information exchange
information technologies
camouflage traffic
jamming attack
jamming attacks
jamming resilience
latency guarantee
message delay minimization
multiple-frequency channel
network load balance
network traffic load
Power distibution
power infrastructures
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Thu, 04/30/2015 - 11:45am
network capacity
Vectors
Transforms
source rate
secrecy
Robustness
rate-optimal
random linear network coding
random codes
polynomial-time distributed network codes
network coding
Achievable rates
malicious errors
linear codes
Jamming
interior nodes
error probability
error control
eavesdropping
communicating information
communicated message
adversary
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »