Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
destination nodes
biblio
Research on Physical Layer Security of Cooperative Networks Based on Swipt
Submitted by grigby1 on Fri, 04/10/2020 - 11:20am
energy harvesting
time allocation parameter
system security outage probability
SWIPT
source node
simultaneous wireless information and power transfer
relay nodes
relay networks (telecommunication)
radiofrequency power transmission
radio signals
radio receivers
radio networks
physical layer security performance
information long-distance transmission
energy-constrained nodes service life
computer network security
eavesdropping users
destination nodes
cooperative networks
Cooperative Network
cooperative communication
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
probability
power engineering computing
computer network reliability
biblio
LDPC-based Joint Source-Channel-Network Coding for the Multiple Access Relay Channel
Submitted by aekwall on Mon, 11/25/2019 - 1:06pm
Markov sources
Joint Source Channel Network scheme
JSCN coding
LDPC channel code
LDPC codes
LDPC source code
LDPC-based joint source-channel-network coding
MARC setup
MARC system
Joint Source Channel Network LDPC codes
multiple access relay channel
noise figure 5.0 dB
source coding
source data
source nodes
sources-relay data
sources-relay links
Markov processes
pubcrawl
composability
Metrics
Decoding
channel coding
iterative decoding
parity check codes
Relays
Resiliency
combined source-channel coding
network coding
compressed symbols
conventional LDPC code
decoding scheme
destination nodes
iterative joint decoding algorithm
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
Resiliency
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
mobile ad hoc networks
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field
AODV
Metrics
MANET
IDS
high destination sequence number
destination nodes
delays
data packets
cross checking
Conferences
Compositionality
clustering
byzantine attacks
Blackhole
black-hole attack mitigation techniques
attack mitigation