Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
physical layer security
biblio
A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
fading channels
amplify-and-forward cooperative spectrum sensing
average secrecy rate
Cognitive Radio Network
cognitive radio networks
Communication system security
compressed sensing
correlated AP
CRN network
Amplify-and-Forward
fusion center
malicious eavesdropping secondary users
Relays
secondary user
sensing data
sensor fusion
stochastic geometry
stochastic method
resilience
sensors
Wireless communication
telecommunication security
secure transmission
pubcrawl
composability
Metrics
Resiliency
security
Interference
physical layer security
cognitive radio
cooperative communication
radio spectrum management
active SUs
AF-CSS-CRN
amplify and forward communication
biblio
Study on the Effect of System Parameters on Physical-Layer Security of Optical CDMA Systems
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
encryption
wiretap channel model
system parameters
secrecy capacity
physical-layer security
Physical layer
optical transmission links
optical links
optical fibre networks
optical CDMA systems
Optical CDMA (OCDMA)
OCDMA systems
fibre-optic eavesdropping attacks
Cryptography
cross-correlation characteristics
communication system
code words
code division multiplexing
code division multiple access
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
biblio
Research on Physical Layer Security of Cooperative Networks Based on Swipt
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
energy harvesting
time allocation parameter
system security outage probability
SWIPT
source node
simultaneous wireless information and power transfer
relay nodes
relay networks (telecommunication)
radiofrequency power transmission
radio signals
radio receivers
radio networks
physical layer security performance
information long-distance transmission
energy-constrained nodes service life
computer network security
eavesdropping users
destination nodes
cooperative networks
Cooperative Network
cooperative communication
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
probability
power engineering computing
computer network reliability
biblio
Physical layer security against cooperative anomaly attack using bivariate data in distributed CRNs
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
Communication system security
wireless technology
wireless sensor networks
wireless communication network
signal detection
Robust distance measure
radio spectrum management
OSI network model
multiple anomaly detection algorithm
mahalanobis distance measure
Eigenvalues and eigenfunctions
eigenvalue-based sensing
distributed spectrum sensing
Cooperative SSDF attacks
cooperative communication
cooperative anomaly attack
sensors
cognitive radio networks
cognitive radio networking
cognitive radio
bivariate data
Anomaly
wireless channels
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
telecommunication security
Wireless communication
Computational modeling
biblio
A Secure and Power-Efficient Constellations for Physical Layer Security
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
communication security
wireless networks
wireless channels
symmetrical constellations
symbol error rate performance
SER performance
power-efficient constellations
power-efficiency
polarization modulation
Monte Carlo simulation
Monte Carlo methods
double-layer constellations
double layers constellations
telecommunication security
8
4
16-order double-layer constellations
physical layer security
error statistics
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
A Novel Physical Layer Security Technique Using Master-Slave Full Duplex Communication
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
omnidirectional antenna
high power signal
Interference
interference masks
Internet-of-Things networks
IoT networks
IoT node
legitimate intended nodes
Master-slave communication
master-slave full duplex communication node
full-duplex manner
omnidirectional antennas
Phase modulation
phase-modulated random key-data generation
physical layer security
physical layer security technique
received signal
receiving antennas
self-interference cancellation
signal transmission
resilience
security
computer network security
computer network reliability
Reliability
Receivers
pubcrawl
composability
Metrics
Resiliency
Internet of Things
BER
Bit error rate
bit-error rate
communication reliability
directional antennas
directive antennas
error statistics
Eve location
full-duplex
biblio
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
parity check codes
LLR-based turbo code
log-likelihood ratio
low-density parity check code
Maximum likelihood decoding
Metrics
MIMO communication
modulation
modulation coding
network coding
numerical analysis
numerical evaluation
LLR-based outer channel coding
physical layer security
polar code
polar code concatenation
polar codes
pubcrawl
resilience
Resiliency
SCAD
secure channel coding effect
sequential LLR
composability
5G networks
bit error rate performance
block codes
C-MIMO transmission scheme
channel coding
chaos
chaos multiple-input multiple-output-based polar concatenation code
chaos transmission
chaotic communication
chaotic MIMO block modulation
5 G
concatenated codes
convolutional code
Convolutional codes
cyber physical systems
Decoding
error correction ability
error correction codes
error statistics
iterative decoding
LDPC-concatenated transmission
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Scalable QAM Modulation for Physical Layer Security of Wireless Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:33am
wireless networks
Scalable Security
wireless channel
scalable quadrature modulation
scalable QAM
quadrature amplitude modulation
QAM modulation
OFDM
Internet of Things concept
FFT
connected devices
cryptographic algorithms
IoT
wireless channels
Scalability
energy consumption
physical layer security
Data protection
pubcrawl
IoT applications
IoT devices
Internet of Things
computer network security
biblio
A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels
Submitted by grigby1 on Wed, 03/04/2020 - 4:15pm
telecommunication security
physical layer security
private key cryptography
pubcrawl
secret key generation studies
security
software radio
TDD
TDD mode
Pearson correlation coefficient
theoretical analysis
theoretical cryptography
time division duplexing
time division multiplexing
USRP
wireless channel reciprocity
wireless channels
X310 universal software radio peripheral
FDD
channel state information
composability
Compositionality
correlation methods
CSI correlation coefficient
eavesdropping attack
eavesdropping distance
eavesdropping wiretap channel model
channel reciprocity
FDD channel reciprocity
FDD wiretap channels
frequency division duplexing
frequency division multiplexing
indoor radio
indoor wireless CSI measurement system
legitimate channel
N210
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »