Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Bit error rate
biblio
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing
Submitted by grigby1 on Tue, 02/16/2021 - 11:47am
learning (artificial intelligence)
pubcrawl
Metrics
resilience
Resiliency
Throughput
optimization
5G mobile communication
radio access networks
composability
telecommunication computing
resource allocation
Dynamic scheduling
Radio Access Network
resource management
Reinforcement learning
Bit error rate
5G radio access network slicing
5G security
computational constraints
Dynamic Resource Allocation
dynamic resource optimization
frequency-time blocks
network optimization
network slice requests
network slicing
Q-learning solution
dynamic networks
biblio
On Countermeasures Against the Thermal Covert Channel Attacks Targeting Many-core Systems
Submitted by grigby1 on Wed, 02/10/2021 - 11:52am
security of data
pubcrawl
resilience
Resiliency
Scalability
thermal noise
multiprocessing systems
Receivers
Compositionality
Transmitters
Temperature sensors
error statistics
covert channels
Bit error rate
signal detection
Multicore processing
critical defense issue
Defense against Covert Channel Attack
DVFS technique
dynamic voltage frequency scaling technique
Many-core systems
manycore systems
signal frequency scanning
TCC attack
Thermal Covert Channel
thermal covert channel attacks
three-step countermeasure
biblio
Chaotic Constellation Scrambling Method for Security-Enhanced CO-OFDM/OQAM Systems
Submitted by aekwall on Mon, 01/18/2021 - 10:22am
Scalability
Cryptography
Resiliency
pubcrawl
Metrics
Bit error rate
error statistics
chaotic cryptography
chaotic encryption
quadrature amplitude modulation
transmitted information
encryption scheme
optical communication
communication system
OFDM modulation
BER
chaotic constellation scrambling (CCS)
chaotic constellation scrambling method
chaotic cross mapping
coherent optical OFDM-OQAM system
coherent optical OFDM/OQAM
encryption methods
encryption project
offset quadrature amplitude modulation
security-enhanced
security-enhanced CO-OFDM-OQAM systems
biblio
Adaptive filtering of non-fluctuation interference when receiving signals with multi-position phase shift keying
Submitted by grigby1 on Mon, 12/28/2020 - 11:47am
adaptation coefficient
adaptive filter
adaptive filtering
adaptive filters
adaptive nonrecursive filter
adjustment algorithm
Bit error rate
constant envelope
filtering theory
Harmonic analysis
harmonic interference
Interference
interference (signal)
Metrics
multiposition phase shift keying
noise immunity
non-fluctuation interference
nonfluctuation interference
optimal filter parameters
Phase shift keying
Power harmonic filters
pubcrawl
quadrature coherent signal receiver
Receivers
receiving signals
recursive filters
resilience
Resiliency
Scalability
Signal to noise ratio
signal with multi-position phase shift keying
weighting coefficients
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
error statistics
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
communicating devices
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
MITM Attack
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
biblio
Orthogonal STBC Set Building and Physical Layer Security Application
Submitted by grigby1 on Tue, 12/15/2020 - 12:26pm
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
security
Cryptography
Wireless communication
network security
Buildings
Compositionality
Signal processing algorithms
Monte Carlo methods
Decoding
error statistics
information theory
Physical layer
Bit error rate
transmitting antennas
coding theory
Transforms
communication complexity
BER
brute force decoding complexity
communications link
complex orthogonal space-time block code
encodes data symbols
Monte Carlo simulations
orthogonal codes
orthogonal STBC matrix
orthogonal STBC set building
physical layer security application
physical layer security.
PLS
space-time block code
space-time block codes
transformation algorithms
biblio
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
Submitted by grigby1 on Fri, 12/11/2020 - 1:33pm
attentional sequence models
Biological system modeling
Bit error rate
Cloud Computing
cloud computing environments
cloud-specific optimization problems
data privacy
deep federated defenses
feature extraction
feature representation
federated learning
graph neural networks
graph theory
Human behavior
hypergraph learning models
inductive graph
invasive software
learning (artificial intelligence)
machine learning
machine learning models
malware
Malware Analysis
malware containment
malware detection
Malware-Detection-Cloud-Computing-Graph-Neural-Networks-Federated-Learning-Multicloud-Natural-Language-Processing
Metrics
neural nets
privacy
Privacy Requirements
pubcrawl
resilience
Resiliency
Task Analysis
Training
virtual machines
biblio
Covert Communications-Based Information Reconciliation for Quantum Key Distribution Protocols
Submitted by grigby1 on Thu, 07/16/2020 - 11:19am
Adaptive optics
authenticated public channel
BB84 protocol
Bit error rate
Bragg gratings
channel loss
channel noise
composability
Compositionality
covert channels
covert communication
covert communication channel
covert communications-based information reconciliation
Cryptographic Protocols
detector noise
error statistics
Jamming
noiseless public channel
optical transmitters
parity bits
Photonics
polarization entanglement
Protocols
pubcrawl
QBER
QKD
QKD protocol
QKD system
quantum bit-error rate
quantum channel
quantum cryptography
quantum key distribution protocol
resilience
Resiliency
Scalability
secure key rates
unsecure key
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
Resiliency
pubcrawl
composability
Metrics
data encapsulation
Image coding
Bit error rate
channel coding
Noise measurement
distortion
Transform coding
Payloads
error correction
error correction codes
Convolutional codes
Steganography
noisy channel
forward error correction
Adaptive steganography
channel error rate
Dual-syndrome Trellis Codes
embedding process
nonadversarial noise
STC
syndrome codes
trellis codes
unacceptably-high payload error rates
biblio
A Novel Physical Layer Security Technique Using Master-Slave Full Duplex Communication
Submitted by grigby1 on Fri, 04/10/2020 - 11:19am
Internet of Things
security
computer network security
computer network reliability
Reliability
Receivers
pubcrawl
composability
Metrics
Resiliency
resilience
BER
Bit error rate
bit-error rate
communication reliability
directional antennas
directive antennas
error statistics
Eve location
full-duplex
full-duplex manner
high power signal
Interference
interference masks
Internet-of-Things networks
IoT networks
IoT node
legitimate intended nodes
Master-slave communication
master-slave full duplex communication node
omnidirectional antenna
omnidirectional antennas
Phase modulation
phase-modulated random key-data generation
physical layer security
physical layer security technique
received signal
receiving antennas
self-interference cancellation
signal transmission
1
2
3
next ›
last »