Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
STEM
biblio
Detection Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
Cognitive radio (CR) network
Cognitive Radio Security
yardstick based threshold allocation technique
Yardstick based Threshold Allocation (YTA)
X-graph
unlicensed secondary users
spectrum sensing
spectrum scarcity problem
spectrum access probability
Secondary User (SUs)
Primary User Emulation Attack (PUEA)
Primary User (PU)
ns2
free spectrum
dynamic cognitive radio networks
pubcrawl
radiofrequency interference
primary user emulation attack
emulation
licensed primary user
radio spectrum management
cognitive radio
STEM
resource management
sensors
estimation
Analytical models
telecommunication security
Resiliency
resilience
biblio
Smart augmented reality glasses in cybersecurity and forensic education
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
heads-up display devices
teaching
STEM
Smart Augmented-Reality Glasses
smart augmented reality glasses
Scalability
resilience
pubcrawl
privacy
Mobile handsets
learning solutions
learning gaps
learning experiences
Human behavior
high resolution optical head mounted display
helmet mounted displays
augmented reality
Glass
Forensics
forensic education
experimental learning
education
discovery learning
Digital Forensics
cybersecurity theories
cybersecurity education
cybersecurity analysts
Computers
computer security
computer science education
computer aided instruction
characteristics of cybersecurity analysts
biblio
Semi-Finite Length Analysis for Secure Random Number Generation
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
upper bounds
random key generation
STEM
Solids
semifinite length analysis
secure random number generation
secure key generation length
lower bounds
imperfect random numbers
asymptotic expansion
Upper bound
Scalability
set theory
random number generation
Lattices
Entropy
Distribution functions
Metrics
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Video Steganography by Neural Networks Using Hash Function
Submitted by grigby1 on Mon, 02/10/2020 - 11:44am
neural nets
video steganography
video signal processing
video content
video
telecommunication security
STEM
stego video
steganography detection
Steganography
steganographic techniques
pubcrawl
PSNR
privacy
Neural networks
Artificial Neural Networks
MSE
Metrics
Image Steganography
hybrid neural networks
Hash Function
hash algorithm
hash
discrete wavelet transforms
digital video
Data mining
Cryptography
computer science
composability