Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

untrusted relaying

biblio

Visible to the public Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User

Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
  • source information
  • resilience
  • Resiliency
  • secondary cooperative node
  • secrecy outage probability
  • security
  • Security analysis
  • Signal to noise ratio
  • SOP
  • Relays
  • telecommunication security
  • tight lower bound expression
  • transmission secrecy performance
  • transmit power
  • untrusted energy-limited secondary cooperative user
  • untrusted relaying
  • untrusted secondary user
  • wireless networks
  • primary transmission security
  • Cognitive Radio Security
  • diversity reception
  • Maximum ratio combining
  • maximum ratio combining scheme
  • MRC scheme
  • overlay cognitive wireless networks
  • physical layer security
  • power system reliability
  • cognitive radio
  • primary user information secrecy performance
  • primary user information security
  • probability
  • programmable logic arrays
  • pubcrawl
  • radio transmitters
  • relay links

Terms of Use  |  ©2023. CPS-VO