Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
physical layer security
biblio
Towards Formal Security Analysis of Industrial Control Systems
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
formal methods
security
pubcrawl
composability
formal analysis
physical layer security
resilience
Metrics
Resiliency
cyber-physical system
formal models
practical security assessment
biblio
Attack Scenario Modeling for Smart Grids Assessment Through Simulation
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
security
pubcrawl
composability
physical layer security
simulation
resilience
Metrics
cyber-physical systems
Resiliency
Modeling Attacks
Smart Grids
biblio
Channel Spoofer: Defeating Channel Variability and Unpredictability
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
pubcrawl
composability
physical layer security
resilience
Metrics
wireless network
Resiliency
channel reciprocity
biblio
Implementing a real-time capable WPLS testbed for independent performance and security analyses
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
security
personal area networks
physical layer security
pubcrawl
real-time capable WPLS testbed
real-time systems
resilience
Resiliency
secret key rate estimation
Particle measurements
security analyses
security evaluations
telecommunication security
Wireless communication
Wireless Physical Layer Security
wireless sensor networks
WPLS research results
8-bit MCU 8051
off-the-shelf hardware
microcontrollers
Metrics
legitimate parties
key management
key extraction
Internet of Things
independent performance
IEEE 802.15.4 communication standard
generically multiple transceivers
Entropy
eavesdropper
Correlation
composability
Atmospheric measurements
biblio
Physical layer security transmission in cognitive radio network composed of multi-downlinks SU network
Submitted by grigby1 on Thu, 06/07/2018 - 2:55pm
Signal to noise ratio
secrecy rate
multi-downlinks
Downlink
Cognitive Radio Network
channel selection
Resiliency
Metrics
resilience
pubcrawl
beamforming
array signal processing
Receivers
Physical layer
physical layer security
Interference
network security
composability
biblio
Full-duplex relay for enhancing physical layer security in Wireless Sensor Networks: Optimal power allocation for minimizing secrecy outage probability
Submitted by grigby1 on Thu, 06/07/2018 - 2:55pm
pubcrawl
composability
physical layer security
Physical layer
Relays
artificial noise
resilience
resource management
power system reliability
probability
receiving antennas
secrecy outage probability
Metrics
MIMO communication
Resiliency
optimal power allocation
biblio
A physical layer security algorithm based on constellation
Submitted by grigby1 on Thu, 06/07/2018 - 2:55pm
pubcrawl
composability
network security
physical layer security
Physical layer
Classification algorithms
resilience
Metrics
Resiliency
constellation
cyclostatìonary
high-order cumulants
Phase shift keying
biblio
Security-reliability tradeoff for cooperative multi-relay and jammer selection in Nakagami-m fading channels
Submitted by grigby1 on Thu, 06/07/2018 - 2:55pm
Reliability
SRT
Physical layer security (PLS)
Nakagami-m fading
CJ
Resiliency
fading channels
Metrics
resilience
security
Relays
Jamming
Wireless communication
physical layer security
IP networks
composability
pubcrawl
biblio
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework
Submitted by grigby1 on Mon, 03/19/2018 - 2:00pm
jamming detection
Wireless communication
Stochastic processes
stochastic games
secret communication
Scalability
Resiliency
resilience
reliable wireless communication
Reliability
pubcrawl
physical layer security
Metrics
legitimate transmission link
Adversary Models
jamming attack
Jamming
intrusion detection system
Human behavior
Games
game theory
game theoretical framework
Eavesdropping detection
eavesdropping
dual detection techniques
computer network security
Communication system security
biblio
Secure key management for 5G physical layer security
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
Scalability
next generation 5G wireless networks
parity check codes
passive eavesdropper
Physical layer
physical layer security
pubcrawl
resilience
Resiliency
network security
secure key management
Signal to noise ratio
telecommunication security
unsecured wireless medium
very high error probability
Wireless communication
wiretap channel
LDPC codes
Communication system security
Correlation
diversity order
eavesdropping channels
error statistics
Human behavior
key management
LDPC
5G mobile communication
legitimate communication parties
legitimate receiver
legitimate transmitter
legitimate users
low density parity check codes
Metrics
mobility management (mobile radio)
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »