Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
signal processing security
biblio
A filter selection based physical layer security system
Submitted by
aekwall
on Mon, 03/25/2019 - 8:58am
network security
Conferences
Receivers
telecommunication security
Resiliency
pubcrawl
composability
Communication system security
Wireless communication
Metrics
Signal to noise ratio
eavesdropper
eavesdropping attacks
EVM
filter design
filter selection
filtering theory
Physical layer
physical layer security
physical layer security method
physical layer security system
radio networks
Roll of factor
root raised cosine filters
RRC
software radio
USRP
signal processing security
biblio
The Information Processing in the Cybernetic Environment of Signals Intelligence
Submitted by
aekwall
on Mon, 03/25/2019 - 8:58am
Resiliency
pubcrawl
composability
component
Metrics
Decision Making
cybernetic environment
cybernetics
Cyberspace
electronic warfare
information and communication technology
information processes
information processing
information processing system
Information systems
intelligence information
military computing
military operations
Signal Intelligence
Signals Intelligence
signal processing security
biblio
Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security
Submitted by
aekwall
on Mon, 03/25/2019 - 8:58am
telecommunication security
security
Resiliency
pubcrawl
composability
Wireless communication
matrix algebra
Metrics
Vectors
Signal to noise ratio
physical-layer security
antenna arrays
antennas
array signal processing
base station
beam selection
BS
Cellular networks
cellular radio
Downlink
downlink cellular network
eavesdroppers
Interference
legitimate mobile stations
multiple beam forming matrices
novel pseudorandom beamforming technique
opportunistic feedback
opportunistic scheduling
optimal beamforming matrix
orthogonal beamforming vectors
radio links
Random beamforming
received signal-to-interference-and-noise ratio value
received SINR value
secrecy rate
secrecy sum-rate maximization
signal processing security
biblio
Detecting an Alteration in Biometric Fingerprint Databases
Submitted by
aekwall
on Mon, 03/25/2019 - 8:58am
Resiliency
pubcrawl
composability
support vector machine
Metrics
biometrics
Fake fingerprints
fingerprints
signal processing security
biblio
Efficient Software Implementation of ZUC Stream Cipher
Submitted by
aekwall
on Mon, 03/25/2019 - 8:58am
Resiliency
pubcrawl
composability
Metrics
optimization
information security
Mobile communication
software implementation
ZUC stream cipher
signal processing security
biblio
Abnormal Trajectory Detection for Security Infrastructure
Submitted by
aekwall
on Mon, 03/25/2019 - 8:57am
Resiliency
pubcrawl
composability
Metrics
Detection anomaly
One Class SVM
security infrastructure
sequence analysis
signal processing security
biblio
Redundant Dictionary Construction via Genetic Algorithm
Submitted by
aekwall
on Mon, 03/25/2019 - 8:57am
Resiliency
pubcrawl
composability
Metrics
array signal processing
genetic algorithm
Redundant Dictionary
restricted isometry property
signal processing security
biblio
SOTERIA: Exploiting Process Variations to Enhance Hardware Security with Photonic NoC Architectures
Submitted by
aekwall
on Mon, 03/25/2019 - 8:57am
Resiliency
pubcrawl
composability
Metrics
Process Variations
Hardware Security
photonic NoCs
signal processing security
biblio
An Improved Digital Chaotic Encoder
Submitted by
aekwall
on Mon, 03/25/2019 - 8:57am
chaos coding
composability
digital filter
Metrics
pubcrawl
Resiliency
secure communication
signal processing security
biblio
A contribution to cyber-security of networked control systems: An event-based control approach
Submitted by
grigby1
on Wed, 12/20/2017 - 12:00pm
security
Controller Synthesis
Metrics
pubcrawl
Resiliency
privacy
composability
sensors
Mathematical model
attack/fault detection
bilinear matrix inequality
bilinear systems
BMI
control design
control system synthesis
Cyber-security
event-based control approach
fault tolerant control
fault tolerant detection
FTD
linear matrix inequalities
NCS
networked control systems
nonlinear control systems
Observers
process control
residual generator
three-tank system
signal processing security
1
2
3
next ›
last »