Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless security
biblio
5G Physical Layer Resiliency Enhancements with NB-IoT Use Case Study
Submitted by grigby1 on Fri, 03/17/2023 - 10:20am
pubcrawl
resilience
Resiliency
5G mobile communication
Protocols
military communication
simulation
5G
Physical layer
Interference
wireless security
Defense industry
tactical communications
biblio
IO-Link Wireless Device Cryptographic Performance and Energy Efficiency
Submitted by grigby1 on Fri, 09/30/2022 - 3:55pm
Compositionality
IO-Link Wireless
industrial wireless networks
ios
iOS Security
Energy Efficiency
Resiliency
wireless security
timing
Software algorithms
security
Wireless communication
wireless sensor networks
system-on-chip
performance evaluation
resilience
Metrics
Human Factors
pubcrawl
biblio
Adversarial Attacks on Deep Learning Based Power Allocation in a Massive MIMO Network
Submitted by aekwall on Fri, 07/01/2022 - 9:46am
deep learning
Perturbation methods
tools
Wireless communication
pubcrawl
Scalability
Resiliency
Artificial Neural Networks
resource management
wireless security
Neural networks
adversarial attacks
precoding
massive MIMO
power allocation
Chained Attacks
biblio
Deep Learning for Cyber Deception in Wireless Networks
Submitted by grigby1 on Thu, 06/09/2022 - 2:33pm
deep learning
pubcrawl
resilience
Resiliency
Throughput
Scalability
military communication
wireless networks
Numerical models
Jamming
iobt
cyber deception
wireless security
Limiting
Human Factors
channel scheduling
biblio
Evaluating and Improving Adversarial Attacks on DNN-Based Modulation Recognition
Submitted by grigby1 on Tue, 10/12/2021 - 2:48pm
adversarial attacks
convergence
deep learning
Iterative methods
Measurement
Metrics
modulation
modulation recognition
Perturbation methods
Predictive models
predictive security metrics
pubcrawl
Task Analysis
wireless security
biblio
Key Rate Enhancement by Using the Interval Approach in Symmetric Key Extraction Mechanism
Submitted by aekwall on Tue, 08/17/2021 - 4:17pm
Floors
wireless security
wireless networks
symmetric key extraction mechanism
Quantization (signal)
key rate
key bit difference
interval approach
indoor environment
Scalability
key management
Communication system security
Ad hoc networks
testing
Human behavior
Resiliency
Metrics
pubcrawl
biblio
Physical Adversarial Attacks Against Deep Learning Based Channel Decoding Systems
Submitted by aekwall on Mon, 03/15/2021 - 11:57am
Jamming
wireless security
telecommunication security
Resiliency
pubcrawl
private key cryptography
physical white-box
physical adversarial attacks
Perturbation methods
Noise measurement
Neural networks
modulation
Metrics
learning (artificial intelligence)
white box cryptography
huge success
deep learning channel
deep learning
Decoding
conventional jamming attacks
composability
classical decoding schemes
channel decoding systems
channel decoding
channel coding
black-box adversarial attacks
Artificial Neural Networks
adversarial attacks
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
biblio
Bluetooth devices fingerprinting using low cost SDR
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
Clocks
wireless security
wireless communication scheme
transmitters identification
Software Defined Radios
physical-layer fingerprinting approach
low cost SDR
communication protocol
Bluetooth scan
Bluetooth devices fingerprinting
authentication layer
software radio
bluetooth security
Bluetooth
Physical layer
Synchronization
fingerprint identification
composability
Wireless communication
Communication system security
Protocols
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
biblio
BIAS: Bluetooth Impersonation AttackS
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
attacks
wireless communication pervasive technology
slave impersonation attacks
secure connection establishment
secure authentication procedure
mandatory mutual authentication
impersonation
Bluetooth version
Bluetooth standard
Bluetooth Impersonation AttackS
Bluetooth devices
Bluetooth chips
BIAS attacks
authentication procedure
bluetooth security
wireless security
authorisation
mobile radio
ubiquitous computing
composability
standards
Protocols
Cryptography
authentication
performance evaluation
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
1
2
next ›
last »