Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
GTJ method
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 4:08pm
telecommunication computing
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
markov chain
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
gradient methods
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
Acoustic Fingerprints
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node