Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
radio receivers
biblio
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network
Submitted by grigby1 on Fri, 10/26/2018 - 4:53pm
INFECT
wireless openaccess research platform
wireless LAN
Trojan horses
Signal to noise ratio
security
Scalability
Robustness
Resiliency
radio transmitters
radio receivers
radio networks
pubcrawl
802.11a/g transmitter
inconspicuous FEC-based trojan
hardware attack
forward error correction
FEC encoding
Decoding
Contamination
channel noise profiling
channel noise
channel coding
Binary phase shift keying
802.11a/g wireless network
biblio
A centralized inter-cell rank coordination mechanism for 5G systems
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
MMSE receiver
conventional non interference-aware schemes
future fifth generation wireless system
game-theoretic interference pricing measure
intercell interference management mechanism
interference aware intercell rank coordination framework
interference pricing
interference resilience property
interference resilience trade-off
least mean squares methods
linear minimum mean squared error receivers
mean signal-to-interference-plus-noise ratio
centralized intercell rank coordination mechanism
MMSE receivers
multiple receive antennas
multiple transmit antennas
random matrix theory
rank adaptation
receiving antennas
space division multiplexing
spatial multiplexing
transmitter-receiver pair
transmitting antennas
antenna arrays
pubcrawl
matrix algebra
Interference
Receivers
radio receivers
radiofrequency interference
Signal to noise ratio
estimation
resilience
Throughput
Transmitters
game theory
5G mobile communication
MIMO
search problems
5G
Pricing
Monte Carlo methods
Monte Carlo simulations
Computing Theory
5G systems
brute-force exhaustive search algorithm
biblio
Chaotic secure digital communication scheme using auxiliary systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
inclusion technique
transmitter side
transmitter parameters
telecommunication security
security
secure message transmission scheme
Resiliency
Receivers
receiver side
radio transmitters
radio receivers
pubcrawl
Observers
observer
modified Henon hyperchaotic discrete-time system
Metrics
auxiliary chaotic systems
hyperchaotic discrete primary chaotic systems
encryption function
encryption
encrypted message
dynamical left inversion technique
discrete time systems
digital signal processing
digital communication
Cryptography
composability
chaotic synchronization
chaotic secure digital communication scheme
chaotic cryptography
chaotic communication
Auxiliary transmitters
biblio
Implementation of GPS signal simulation for drone security using Matlab/Simulink
Submitted by grigby1 on Wed, 12/20/2017 - 12:59pm
signal data
Jamming
Mathematical model
noise models
P code
radio receivers
radiofrequency interference
Satellite broadcasting
Satellites
IF GPS signal
signal processing
signal processing algorithm
Signal to noise ratio
Signal-to-noise ratio (SNR)
simulated signals
simulation model
spoofing-jamming interference
signal processing security
Drone security
pubcrawl
Resiliency
privacy
composability
Radiation detectors
Generators
carrier-to-noise ratio estimation
digital intermediate frequency GPS signal
Metrics
drone security applications
Global Positioning System
GPS receivers
GPS signal generator
GPS signal simulation
GPS spoofing signal generation
IF (intermediate frequency) signals
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
biblio
A fair exchange and track system for RFID-tagged logistic chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
radiofrequency identification
verifiably encrypted signature
telecommunication security
supply chains
Supply Chain
RFID tags
RFID tagged supply chains
RFID tagged logistic chains
RFID
Receivers
cryptographic attestation
radio receivers
radio frequency identification
pubcrawl170112
Protocols
logistics operations
Iron
fair exchange techniques
fair exchange
Cryptography
biblio
"VLSI implementation of BER measurement for wireless communication system"
Submitted by grigby1 on Tue, 02/14/2017 - 12:50pm
forward error correction
wireless communication system
Wireless communication
VLSI implementation
VLSI
Very large scale integration
telecommunication control
symmetric encryption algorithm
Receivers
radio transmitters
radio receivers
pubcrawl170102
MIMO transmitter
MIMO receiver
MIMO communication
forward error correction codes
BER
FEC codes
fading channels
fading channel
error statistics
encryption
Data Transmission
Data Security
data reliability
CSEEC
cryptosystem with embedded error control
Cryptography
Crypto-System
Bit error rate
BER measurement communication system
biblio
Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets
Submitted by BrandonB on Wed, 05/06/2015 - 9:23am
software defined radio
radio networks
radio receivers
radio transmitters
radiometric signature
receiver
SDR
Signal to noise ratio
signal-to-noise ratio
radio frequency oscillators
software radio
telecommunication security
time varying carrier frequency offsets
transmitter
Wireless communication
wireless communications devices
wireless device authentication
Kalman prediction error
carrier frequency offset (CFO)
CFO
Doppler shift
estimation
fading channels
Hypothesis testing
Kalman filtering
Kalman filters
authentication
mobile systems
multipath channels
multipath fading channels
nominal oscillating frequency
Physical layer
physical layer authentication
prototype platform
biblio
A characterization of uncoordinated frequency hopping for wireless secrecy
Submitted by BrandonB on Fri, 05/01/2015 - 8:16am
spread spectrum communication
wireless transmissions
wireless secrecy
Wireless communication
uncoordinated frequency hopping characterization
Time-frequency Analysis
Throughput
telecommunication security
spread spectrum scheme
communication secrecy level
security
secret-key exchange
radio transmitters
radio receivers
Jamming
Interference
Cryptography
biblio
Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere
Submitted by BrandonB on Thu, 04/30/2015 - 12:48pm
radio receivers
Upper bound
transmitting antennas
transmitter
telecommunication security
s.d.o.f
receiving antennas
Receivers
receiver
Rayleigh channels
radio transmitters
antennas
multiple input multiple output
MIMO Rayleigh block fading wiretap channels secure DoF
MIMO communication
MIMO
Fading
discrete signalling
degrees of freedom
CSI
Coherence
channel state information
« first
‹ previous
1
2