Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Interference
biblio
Information-spectrum methods for information-theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
channel state information
complex communication scenarios
Cryptography
ergodic fading channels
Fading
fading channels
feedback
Human behavior
Information analysis
information security
information theoretic security
information theory
information-spectrum methods
information-theoretic security
Interference
Jamming
Metrics
Mutual information
policy-based governance
pubcrawl
Random variables
Resiliency
Scalability
secrecy capacity
secure rates
telecommunication security
wiretap channels
biblio
On the Impact of SSDF Attacks in Hard Combination Schemes in Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:05pm
telecommunication security
Resiliency
pubcrawl
Signal to noise ratio
probability
collaboration
Bandwidth
Interference
radio networks
sensors
cooperative communication
signal detection
Cascading style sheets
malicious users
radio spectrum management
cognitive radio
cognitive radio networks
detection performance
AND-rule
AYMU attacks
cooperative spectrum sensing
critical threats
CSS
different hard-decision fusion schemes
fusion center
hard combination schemes
hard data
hard data combining
hard-decision combination
hard-decision fusion scheme
licensed frequency bands
MAJORITY-rule
malicious user
miss detection
OR-rule
Primary User spectrum accessibility
PU
Spectrum Sensing Data Falsification reports
SSDF attacks
user performs Energy Detection
Cognitive Radio Security
biblio
Cooperative Spectrum Sensing and Hard Decision Rules for Cognitive Radio Network
Submitted by aekwall on Mon, 03/15/2021 - 12:02pm
Detectors
mobile computing
Resiliency
pubcrawl
Signal to noise ratio
Interference
multi-access systems
cooperative communication
signal detection
AWGN channels
Wireless communication
radio spectrum management
fading channels
cognitive radio
Cognitive Radio Network
unused spectrum
Cognitive Radio Network.
Cooperative Sensing
cooperative spectrum sensing
energy detection
MATLAB Simulink
primary users
recycle licensed spectrum
sense signals
Simulink Energy Detection
spectrum hole
spectrum owners
spectrum sensing
spectrum sensing cognitive radio
unlicensed spectrum
Cognitive Radio Security
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
adversarial reconnaissance
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
data privacy
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
Network reconnaissance
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
security of data
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
biblio
On the Distributed Jamming System of Covert Timing Channels in 5G Networks
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
security
Servers
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
5G mobile communication
network security
Compositionality
timing
Transmitters
covert timing channel
covert channel
Interference
covert channels
Jamming
radiofrequency interference
5G mobile network
5g network
co-constructing and sharing
distributed jamming system
distributing jammer
diversity networks
diversity reception
fifth generation mobile network
interference algorithm
jam system
modulation
modulation method
biblio
Mitigation of Frequency-Hopped Tick Jamming Signals
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
adaptive filtering
adaptive filters
adaptive notch filters
ANF
experimentation and exploitation
frequency discontinuities
frequency hop communication
frequency-hopped tick Jamming signals
Global Navigation Satellite System jamming
GNSS
GNSS jamming
instantaneous frequency
Interference
interference mitigation
interference suppression
Jamming
jamming components
jamming power
jamming to noise power ratio
Metrics
notch filters
pubcrawl
radio receivers
resilience
Resiliency
RIM techniques
Robust Interference Mitigation techniques
satellite navigation
Scalability
standardisation of GNSS threat reporting and receiver testing through international knowledge exchange
STRIKE3 project
tick signals
biblio
Adaptive filtering of non-fluctuation interference when receiving signals with multi-position phase shift keying
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
adaptation coefficient
adaptive filter
adaptive filtering
adaptive filters
adaptive nonrecursive filter
adjustment algorithm
Bit error rate
constant envelope
filtering theory
Harmonic analysis
harmonic interference
Interference
interference (signal)
Metrics
multiposition phase shift keying
noise immunity
non-fluctuation interference
nonfluctuation interference
optimal filter parameters
Phase shift keying
Power harmonic filters
pubcrawl
quadrature coherent signal receiver
Receivers
receiving signals
recursive filters
resilience
Resiliency
Scalability
Signal to noise ratio
signal with multi-position phase shift keying
weighting coefficients
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by aekwall on Mon, 12/14/2020 - 12:43pm
Resiliency
pubcrawl
composability
sybil attacks
resource management
Wireless communication
Metrics
Interference
radio networks
Resists
electronic commerce
DSA
Cost accounting
dynamic spectrum access
2D truthfulness
bid-independent sorting method
cost-efficient SUs
onlIne spectrum allocation
online spectrum auction
primary user Sybil-proof aUctioN mechAnisM
sequential matching approach
single secondary user
spectrum allocation efficiency
spectrum shortage problem
Sybil-proof spectrum auction mechanisms
Truthful user Sybil-proof aUctioN mechAnisM
Tsunami
biblio
Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:38pm
5G
composability
Compositionality
Evolutionary algorithms
Grey Wolf optimizer
Interference
joint user association-power allocation
multi-access systems
multiple base stations
NOMA
NOMA networks
Non-Orthogonal Multiple Access (NOMA)
nonorthogonal multiple access networks
orthogonal clusters
particle swarm optimisation
particle swarm optimization
physical resource block allocation
power allocation
PSO
pubcrawl
Receivers
resource allocation
resource management
Signal to noise ratio
Silicon carbide
Swarm Intelligence
swarm intelligence algorithms
user association
user grouping procedure
weighted sum rate maximization
biblio
Interference of Cyber Endanger using Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
advanced badgering
assembling
basic ordinary language sections
burden their mates
composability
cosmology
cyber endanger
cyber-tormenting cases
cyberbullying
Hinduja
Interference
internet
less steeply-esteemed acknowledgment displays
line associations
mobile phones
monetary machine
on-line exchanges
Patching
PC systems
persistent repeated mischief
Predictive Metrics
pubcrawl
Resiliency
robotized revelation
SDA
security of data
sort machine
support vector machine
Support Vector Machine(SVM)
Support vector machines
Web record remark
Web structure associations
1
2
3
4
5
6
next ›
last »