Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

UWA channel

biblio

Visible to the public On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack

Submitted by grigby1 on Wed, 01/20/2021 - 4:08pm
  • telecommunication computing
  • Markov processes
  • neural nets
  • probability
  • pubcrawl
  • Quality-of-Service
  • resilience
  • Resiliency
  • state-transition probabilities
  • markov chain
  • telecommunication security
  • threshold-based decoding error model
  • underwater acoustic
  • underwater acoustic channel
  • underwater acoustic communication
  • UWA channel
  • wireless channels
  • gradient methods
  • artificial neural network
  • Artificial Neural Networks
  • authentication
  • authentication constraints
  • channel coding
  • composability
  • effective capacity
  • feature-based authentication
  • Acoustic Fingerprints
  • gradient-descent technique
  • GTJ method
  • Human behavior
  • impersonation attack
  • Kuiper belt
  • malicious data
  • malicious node

Terms of Use  |  ©2023. CPS-VO