Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Frequency modulation
biblio
Chaos-Based Interleave Division Multiple Access Scheme with Physical Layer Security
Submitted by grigby1 on Thu, 06/30/2022 - 5:06pm
channel coding
chaos
chaos modulation
chaotic cryptography
Frequency modulation
IDMA
Metrics
modulation
numerical simulation
physical layer security
pubcrawl
resilience
Resiliency
Scalability
security
biblio
Frequency-based Automated Modulation Classification in the Presence of Adversaries
Submitted by aekwall on Mon, 12/20/2021 - 12:31pm
Human behavior
Adversary Models
RF signals
automatic modulation classification
adversarial attacks
Interference
Frequency modulation
Recurrent neural networks
privacy
security
Resiliency
Metrics
Scalability
pubcrawl
Wireless communication
machine learning
Perturbation methods
deep learning
biblio
Cross-term suppression of multi-component signals based on improved STFT-Wigner
Submitted by aekwall on Mon, 11/08/2021 - 3:27pm
Transforms
pubcrawl
Scalability
Resiliency
Entropy
Predictive Metrics
time-domain analysis
cross-term suppression
Frequency modulation
Interference
short-time Fourier transform
Signal resolution
time-frequency aggregation
Time-frequency Analysis
Wigner-Ville transform
Time Frequency Analysis and Security
biblio
CloakLoRa: A Covert Channel over LoRa PHY
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
lora
software radio
covert communication
amplitude modulated covert channel
amplitude modulation
CloakLoRa
COTS LoRa nodes
covert information
differentiate LoRa symbols
Chirp
LoRa chirps
LoRa PHY
LoRa physical layer
regular LoRa node
regular LoRa packet
spread spectrum communication
unique modulation scheme
Cryptography
Cascading style sheets
Frequency modulation
data encapsulation
covert channels
wireless channels
Compositionality
Receivers
Buildings
Payloads
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
security
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
MITM Attack
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
communicating devices
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
error statistics
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
Bluetooth
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
biblio
Research on Nonlinear Frequency Hopping Communication Under Big Data
Submitted by grigby1 on Fri, 12/11/2020 - 2:41pm
Non - Linearity
Time-frequency Analysis
Time Frequency Analysis
statistical analysis
spread spectrum communication
security of data
security
Scalability
safety assessment
Resiliency
resilience
radiofrequency interference
pubcrawl
nonlinear frequency hopping communication
Big Data
Metrics
Interference
Frequency synchronization
Frequency modulation
Frequency Hopping Communication
frequency hop communication
Frequency conversion
data information
communication safety evaluation framework
communication data informatization processing methods
big data security
big data safety evaluation framework
biblio
Parameter Setting of New Energy Sources Generator Rapid Frequency Response in Northwest Power Grid Based on Multi-Frequency Regulation Resources Coordinated Controlling
Submitted by grigby1 on Fri, 12/11/2020 - 2:41pm
PSASP power grid stability simulation program
frequency security prevention
large-scale power grid stability simulation analysis
multifrequency regulation resources coordinated controlling
new energy sources generator rapid frequency response
northwest power grid
parameter setting
photovoltaic adopting differential rapid frequency regulation parameters
Photovoltaic systems
power sources
Frequency response
rapid frequency regulation
rapid frequency regulation capability
rapid frequency regulation research
Regulation
sending end large power grid
stability simulation analysis
the Northwest Power Grid
wind power
Time Frequency Analysis
frequency control
pubcrawl
Metrics
resilience
Resiliency
Scalability
power grids
power generation control
power system stability
Time-frequency Analysis
security
Frequency modulation
active power-frequency droop control
control level
conventional power supply units
coordinated rapid frequency regulation
energy fast frequency regulation model
energy generator
energy sources rapid frequency regulation
fast frequency control
biblio
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC
Submitted by grigby1 on Tue, 11/17/2020 - 2:39pm
frequency regulator
Clocks
system-on-chip
Frequency modulation
ARM TrustZone
AXI bus
DVFS
Dynamic Voltage and Frequency Scaling
embedded system security
power aware computing
nonsecure ARM core
Regulators
secure ARM core
security failure
TrustZone-enabled heterogeneous SoC
TrustZone-enabled System-on-Chip
voltage regulator
Operating systems security
Instruction sets
IP networks
Trusted Computing
pubcrawl
Metrics
Resiliency
embedded systems
composability
computer architecture
security
hardware trojan
Receivers
resilience
energy consumption
operating systems (computers)
operating systems
operating system
electronic engineering computing
biblio
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Indexes
text analysis
searchable encryption
Scalability
ranked search
pubcrawl
program testing
policy-based governance
multikeyword ranked searchable encryption
multi-keyword search
IoT devices
Internet of Things
ciphertext searching
Frequency modulation
encryption
encrypted data
data privacy
Cryptography
CP-ABE test
CP-ABE
collaboration
Cloud Computing
ciphertext-policy attribute-based encryption test
ciphertext-policy attribute-based encryption
biblio
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
network services
DDoS attack detection
source IP addresses
source IP
probability distributions
Probability distribution
greedy
Frequency modulation
divergence
detection phase
destination IP addresses
destination IP
DDoS attack detection algorithm
greedy algorithms
greedy algorithm
Computer crime
Dogs
probability
Anomaly Detection
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
distributed denial of service attack
IP networks
DDoS
computer network security
1
2
3
next ›
last »