Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
relay selection
biblio
Strategy of Relay Selection and Cooperative Jammer Beamforming in Physical Layer Security
Submitted by aekwall on Sun, 10/16/2022 - 5:10pm
pubcrawl
Metrics
Resiliency
composability
Jamming
physical layer security
resource management
Power demand
Relays
Vehicular and wireless technologies
power allocation
array signal processing
cooperative jamming
relay selection
biblio
FPTSA-SLP: A Fake Packet Time Slot Assignment-based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks
Submitted by grigby1 on Mon, 10/03/2022 - 11:48am
wireless networks
time slot assignment
relay selection
Backtracking
Location Privacy in Wireless Networks
source location privacy
location privacy
Position measurement
underwater acoustic sensor networks
Interference
simulation
pubcrawl
Compositionality
Routing
composability
privacy
Safety
Resiliency
resilience
Metrics
Human behavior
biblio
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks
Submitted by aekwall on Mon, 06/08/2020 - 10:24am
scalable connectivity
networking capabilities
noncooperative game
Predictive Metrics
protected relay
protection level
pubcrawl
relay networks (telecommunication)
relay nodes
relay selection
Scalability
Nash equilibrium convergence analysis
security
source device
source node
spectral efficiency
system capacity
telecommunication security
telecommunication traffic
ubiquitous connectivity
universal communication environment
utility function
equilibrium state
composability
Resiliency
5G mobile communication
5G mobile networks
5G networks
attack-defense
cooperative D-to-D communication
data packet transmission
Device-to-device communication
dynamic game theoretic based approach
Dynamic Networks and Security
extensive signal coverage
game theoretic security
game theory
game-based attack defense model
heterogeneous devices
heuristic algorithm
Human Factors
large-scale mobile networks
link reliability
multiple communication technologies