Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cognitive radio
biblio
A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
fading channels
amplify-and-forward cooperative spectrum sensing
average secrecy rate
Cognitive Radio Network
cognitive radio networks
Communication system security
compressed sensing
correlated AP
CRN network
Amplify-and-Forward
fusion center
malicious eavesdropping secondary users
Relays
secondary user
sensing data
sensor fusion
stochastic geometry
stochastic method
resilience
sensors
Wireless communication
telecommunication security
secure transmission
pubcrawl
composability
Metrics
Resiliency
security
Interference
physical layer security
cognitive radio
cooperative communication
radio spectrum management
active SUs
AF-CSS-CRN
amplify and forward communication
biblio
Physical layer security against cooperative anomaly attack using bivariate data in distributed CRNs
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
Communication system security
wireless technology
wireless sensor networks
wireless communication network
signal detection
Robust distance measure
radio spectrum management
OSI network model
multiple anomaly detection algorithm
mahalanobis distance measure
Eigenvalues and eigenfunctions
eigenvalue-based sensing
distributed spectrum sensing
Cooperative SSDF attacks
cooperative communication
cooperative anomaly attack
sensors
cognitive radio networks
cognitive radio networking
cognitive radio
bivariate data
Anomaly
wireless channels
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
telecommunication security
Wireless communication
Computational modeling
biblio
Cognitive Routing for Improvement of IoT Security
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
secure SDN paths
packet flows
pubcrawl
quality of service
Random Neural Networks
Routing
routing decisions
Scalability
SDN infrastructure
secure networks
Neural networks
security-aware routing
security-by-design concept
SerIoT
software defined networking
telecommunication network routing
telecommunication security
telecommunication traffic
trust relationships
Trust Routing
Europe
cognitive radio
Cognitive routing
Cognitive-Packet-Network
composability
Computer crime
computer network reliability
computer network security
dedicated networks
energy criteria
Cognitive Packet Networks mechanisms
information security
Internet of Things
Internet-of-Things
IoT
IoT security
network architecture
network nodes
Network-Security
neural nets
biblio
A Flexible Anti-Jamming Channel Hopping for Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
LAA scheme
wireless channels
traffic load
Topology
Throughput
telecommunication security
SU node
Resiliency
resilience
pubcrawl
Protocols
Oceans
Load modeling
load awareness anti-jamming channel hopping scheme
anti-jamming channel hopping protocol
Jamming
frequency hop communication
flexible anti-jamming channel hopping
Extended Langford pairing (ELP)
CRN
computer science
Cognitive Radio Security
Cognitive radio networks (CRNs)
cognitive radio networks
cognitive radio
channel hopping sequences
Anti-jamming strategy
biblio
Mitigating Physical Layer Attack in Cognitive Radio - A New Approach
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pubcrawl
Zadoff-Chu sequence
wireless channels
telecommunication security
spectrum sensing
sensors
Resiliency
resilience
replay attack
radio spectrum management
radio frequency spectrum
PUEA
authentication
primary user emulation attack
physical layer attack mitigation
Physical layer
OFDM
emulation
distance calculation
Correlation
Communication channels
Cognitive Radio Security
cognitive radio
biblio
Primary User Authentication in Cognitive Radio Network Using Pre-Generated Hash Digest
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pregenerated hash digest
telecommunication security
sensors
Resiliency
resilience
radio networks
PUEA
pubcrawl
primary user emulation attack
primary user authentication
authentication
node authentication
emulation
Cryptography
CRN
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
Base stations
biblio
Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
source information
resilience
Resiliency
secondary cooperative node
secrecy outage probability
security
Security analysis
Signal to noise ratio
SOP
Relays
telecommunication security
tight lower bound expression
transmission secrecy performance
transmit power
untrusted energy-limited secondary cooperative user
untrusted relaying
untrusted secondary user
wireless networks
primary transmission security
Cognitive Radio Security
diversity reception
Maximum ratio combining
maximum ratio combining scheme
MRC scheme
overlay cognitive wireless networks
physical layer security
power system reliability
cognitive radio
primary user information secrecy performance
primary user information security
probability
programmable logic arrays
pubcrawl
radio transmitters
relay links
biblio
HCOBASAA: Countermeasure Against Sinkhole Attacks in Software-Defined Wireless Sensor Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
probability of false negative
wireless sensor networks
telecommunication security
software-defined wireless sensor cognitive radio network
Sinkhole attack
sink node
sensor nodes
Resiliency
resilience
pubcrawl
probability of false positive
Base stations
probability of detection
Performance Metrics
Hop Count-Based Sinkhole Attack detection Algorithm
HCOBASAA
detection algorithms
Databases
Communication system security
Cognitive Radio Security
cognitive radio
change in position
biblio
Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
PUE attack
unused spectrum
total error reduction
total error probability
telecommunication security
spectrum sensing interval
Signal to noise ratio
sensors
security issues
secondary users
Resiliency
resilience
radio transmitters
radio spectrum management
attacker strength
pubcrawl
probability
primary user spectrum bands
primary user emulation attack
Neyman-Pearson criterion
malicious user
error probability
energy detector
emulation
emulated primary signal
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
biblio
RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless channels
Transmitters
telecommunication security
Signal to noise ratio
RSS-based localization method
RSS-based localization
Resiliency
resilience
Receivers
radiofrequency interference
radio spectrum management
PUE attacker detection
cognitive radio
primary user signals
primary user emulation attacker
primary user emulation attack
mobile users
mobile radio
maximum likelihood estimation
Mathematical model
licensed users
emulation
cognitive radio technology
Cognitive Radio Security
cognitive radio networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »