Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cognitive radio
biblio
Dynamic Reconfigurability of Wireless Sensor and Actuator Networks in Aircraft
Submitted by grigby1 on Mon, 03/19/2018 - 1:48pm
telecommunication traffic
pubcrawl
quality of service
Reliability
resilience
Resiliency
security
sensors
standardization
Metrics
transceivers
wireless networks
wireless sensor
wireless sensor networks
wireless spectrum
wireless terminals
wireless traffic
actuator networks
Human behavior
flexible transceiver hardware
dynamic resource management
dynamic network reconfigurability
dynamic network architecture
dynamic configurability
cross-layer network architectures
composability
cognitive radio
avionics
aircraft communication
Aircraft
Aerospace electronics
actuators
actuator security
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
Identity management using blockchain for cognitive cellular networks
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
pubcrawl
integrated circuits
network signaling traffic
opportunistic network access technologies
Performance
privacy
privacy-enhancing user identity management system
Protocols
pseudonymous identities
Identity management
radio spectrum management
Resiliency
Scalability
spectrum crunch
telecommunication network management
telecommunication security
telecommunication signalling
telecommunication traffic
Cloud Computing
assertion
authentication
authorization
blockchain
blockchain technology
Cellular networks
cellular radio
cloud-centric cognitive cellular networks
accounting
cognitive cellular network blockchain
cognitive radio
contracts
Cryptography
dynamic spectrum access
end-to-end management
Human behavior
biblio
Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks
Submitted by grigby1 on Wed, 01/10/2018 - 12:21pm
Cryptography
wireless sensor networks
wireless networks
telecommunication security
security of wireless communication
Resiliency
Relays
pubcrawl
Physical layer
MIMO communication
MIMO
information theory based compromised nodes detection algorithm
information theory
array signal processing
cryptographic technique
cross-layered security approach
Cross Layer Security
cooperative sensor networks
cooperative MIMO radios
cooperative MIMO communication
cooperative communication
composability
cognitive radio networks
cognitive radio
beamforming
biblio
Enhancing secrecy by full-duplex antenna selection in cognitive networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
power system reliability
transmitting antennas
telecommunication security
secrecy outage probability
secondary users
secondary eavesdropping network
Resiliency
receiving antennas
radio network secrecy enhancement
pubcrawl
probability
antenna arrays
physical layer security
Jamming
full-duplex antenna selection
full-duplex
full duplex communication
Cognitive Radio Security
cognitive radio
cognitive networks
antenna selection
biblio
Secrecy outage probability of full-duplex networks with cognitive radio environment and partial relay selection
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
pubcrawl
underlay cognitive radio networks
Transmitters
Telecommunications
signal processing
secrecy outage probability
Resiliency
Relays
relay networks (telecommunication)
receiving antennas
cognitive radio
Protocols
probability
partial relay selection
multiple relays selection
full-duplex networks
decode-and-forward relay selection
decode and forward communication
Cognitive Radio Security
cognitive radio environment
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
biblio
Location privacy preserving protocols in database-enabled cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
Resiliency
wireless users
wireless spectrum
wireless services
Wireless communication
traffic redirection
telecommunication traffic
telecommunication security
SU location privacy
SU
spectrum utilization
spectrum availability
spectral availability
secondary users
Schedules
cognitive radio
pubcrawl
Protocols
privacy
mobile devices
master device enabled location privacy preserving scheme
location privacy preserving protocols
geolocation database
Databases
database enabled wireless networks
database enabled cognitive radio networks
data privacy
crowd sourced location privacy preserving scheme
Communication system security
Cognitive Radio Security
biblio
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
inference mechanisms
uncertainty handling
telecommunication computing
sensors
security of data
Safety
Resiliency
Reliability
pubcrawl
local IDS agent
local detection decisions
Intrusion Detection
Base stations
IDS Agent
distributed intrusion detection system
Dempster-Shafer's evidence theory
Dempster-Shafer evidence theory
Data collection
D-S evidence theory
CRN
cooperative detection center
Cognitive Radio Security
cognitive radio networks
cognitive radio
biblio
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
Resiliency
probability
PU
PU-PUE
pubcrawl
PUE attacker
PUE position
received signal strength indication
Received signal strength indicator
primary user emulation attack localization
risk management
RSSI
telecommunication security
Trilateration
trilateration technique
uncertainty
wireless sensor networks
Bayes methods
Primary user Emulation
physical network layer coding
network coding
lost function
licensed channel
DoS attack
deny-of-service attack
decision theory
conditional probability
Cognitive Radio Security
cognitive radio networks
cognitive radio
Channel estimation
Bayesian decision theory
Bayesian decision model
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »