Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
5G security
biblio
On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G & Beyond
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
covert channel
random hashing
MAC layer security
Downlink
6G
Resiliency
5G security
Media Access Protocol
Data Exfiltration
covert channels
security
machine-to-machine communications
resilience
Compositionality
Protocols
5G mobile communication
Scalability
performance evaluation
pubcrawl
biblio
6G Security Challenges and Opportunities
Submitted by grigby1 on Tue, 12/20/2022 - 2:36pm
manufacturing
Visible Light Communications Security
wireless communication security
6G wireless communication
6G security
6G mobile communication
5G security
trust
Systematics
privacy
search engines
Wireless communication
Scalability
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services
Submitted by grigby1 on Tue, 03/01/2022 - 4:35pm
5G mobile communication
5G security
complex networks
computer architecture
Conferences
Focusing
Medical services
Network Security Architecture
NFV Security
pubcrawl
resilience
Resiliency
SDN security
security architecture
Software
State based Security Attack Detection
biblio
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
resource management
dynamic networks
Q-learning solution
network slicing
network slice requests
network optimization
frequency-time blocks
dynamic resource optimization
Dynamic Resource Allocation
computational constraints
5G security
5G radio access network slicing
Bit error rate
Reinforcement learning
learning (artificial intelligence)
Radio Access Network
Dynamic scheduling
resource allocation
telecommunication computing
composability
radio access networks
5G mobile communication
optimization
Throughput
Resiliency
resilience
Metrics
pubcrawl
biblio
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
Resiliency
OMNET++
proactive security
proximity-based attack analysis
proximity-based cybercrime
pubcrawl
RAT
reactive solutions
resilience
high-level approach
routine activity theory
security
Security analysis
security problems
security software developers
Software
telecommunication security
5G cellular networks
Hardware
Device-to-device communication
critical IoT devices
CRAT
composability
cellular radio
Cellular networks
capillary network
autonomous vehicles
Autonomic Security
Analytical models
5G security
5G mobile communication
5G environments
5G devices