A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Robust CDMA receiver design under disguised jamming
2016
2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-Under disguised jamming, the deterministic capacity of a CDMA system without secure scrambling is zero!!! ...
Conclusions • We designed a novel CDMA receiver that is robust against disguised jamming; • We developed a secure scrambling scheme to combat disguised jamming in CDMA systems; • We proved that the capacity ...
doi:10.1109/icassp.2016.7472063
dblp:conf/icassp/ZhouSRL16
fatcat:zb6w2tycybhq3mnj5aluirt7aa
The Origins of Spread-Spectrum Communications
1982
IEEE Transactions on Communications
The WHYN, Hush-Up, BLADES, F9C-A/Rake, CODORAC, and ARC-SO systems are featured, along with a description of the prior art in secure communications, and introductions to other early spreadspectrum communication ...
Abstrucz-This monograph reviews events, circa 1920-1960, leading to the development of spread-spectrum communication systems. ...
Published at the same time as Basore's thesis, Pankowski's work details several ideas concerning jamming, multiplexing, and CDMA operation of TR-NOMAC systems. ...
doi:10.1109/tcom.1982.1095547
fatcat:dnq6cqgmvrf7baf2wtvmrevmn4
2013 Index
2014
IEEE Transactions on Wireless Communications
The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages. ...
Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name. ...
Zhang, Lei, +, TWC January 2013 70-79 Anti-Jamming Message-Driven Frequency Hopping-Part II: Capacity Analysis Under Disguised Jamming. ...
doi:10.1109/twc.2011.09.499-tw1401-index
fatcat:w5ya5mg3sbcodb2crtuaoyk3su
Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges
[article]
2022
arXiv
pre-print
Satellite-based Communication systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies and the promising impact they can deliver ...
the identified branches, focusing on dedicated security issues, including, e.g., physical-layer confidentiality, anti-jamming schemes, anti-spoofing strategies, and quantum-based key distribution schemes ...
Table 6 : 6 Comparison of anti-jamming techniques and related system requirements. No Ref. ...
arXiv:2112.11324v4
fatcat:em7bfwxg7bdvzcjkyc5aydiena
Evaluating the Security of Open Radio Access Networks
[article]
2022
arXiv
pre-print
Within the security analysis, we provide a detailed overview of the O-RAN architecture; present an ontology for evaluating the security of a system, which is currently at an early development stage; detect ...
Specifically, we review the architectural blueprint designed by the O-RAN alliance -- A leading force in the cellular ecosystem. ...
Li, “Analysis of mimo band- tacks in wireless networks,” in 2017 International Multi-Conference
limited ds-cdma systems in the presence of multitone jamming on Engineering ...
arXiv:2201.06080v1
fatcat:tqroywb3qvfp5mbgqbg6clmava
Security and privacy in 6G networks: new areas and new challenges
2020
Digital Communications and Networks
, connected robotics and autonomous systems, wireless brain-computer interactions, and blockchain and distributed ledger technologies. ...
The connected robotics and autonomous systems typically rely on the AI and the VLC technology where malicious behavior, encryption and data transmission can be problematic. ...
modulation techniques, such as Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA), which can support both voice and short message services. ...
doi:10.1016/j.dcan.2020.07.003
fatcat:5rn6nc3c4rdopaj5jtqgqihkrq
Supercommons: Toward a Unified Theory of Wireless Communication
2003
Social Science Research Network
Critics of government spectrum licensing advance two alternatives: exclusive property rights and unlicensed sharing through "spectrum commons." ...
The federal government has long controlled the allocation and assignment of electromagnetic spectrum, considered the lifeblood of wireless communication. ...
Such constraints on simultaneous usage as do exist are a complicated function of system design, equipment capacity, and application robustness. ...
doi:10.2139/ssrn.456020
fatcat:atvjqmoozbb5lpupj63lnb2ace
Survey on Multi-Access Edge Computing Security and Privacy
2021
IEEE Communications Surveys and Tutorials
static/dynamic malware analysis and anomaly detection in the current information systems [192] . ...
These intentions are vital for designing and optimizing networking and communication scenarios in emerging systems. ...
doi:10.1109/comst.2021.3062546
fatcat:u3xxvixiw5a4fdl2wxdla24ocu
DSSS-Based Flow Marking Technique for Invisible Traceback
2007
2007 IEEE Symposium on Security and Privacy (SP '07)
We demonstrate a practical flow marking system which requires no training, and can achieve both high detection and low false positive rates. ...
Using a combination of analytical modeling, simulations, and experiments on Tor (a popular Internet anonymous communication system), we demonstrate the effectiveness of the DSSS-based flow mark- * In this ...
Spread spectrum techniques are often used in code division multiple access (CDMA) systems. ...
doi:10.1109/sp.2007.14
dblp:conf/sp/YuFGXZ07
fatcat:5yy323njizf3bo3cqcxf6rjpty
Mobile Phone Sensing Systems: A Survey
2013
IEEE Communications Surveys and Tutorials
, sensor augmented gaming, virtual reality and smart transportation systems. ...
In this paper we have described comprehensively all those systems which are using smart phones and mobile phone sensors for humans good will and better human phone interaction. ...
ACKNOWLEDGMENT The authors wish to acknowledge the anonymous reviewers for their valuable comments and special thanks to Jun Zhang & Chao Chen (Deakin University) for helping to prepare this manuscripts ...
doi:10.1109/surv.2012.031412.00077
fatcat:vbktgtrkqvc6zdnr2qqqclr7am
FUNDAMENTAL OF ADHOC AND SENSOR NETWORK
[article]
2024
Zenodo
FUNDAMENTAL OF ADHOC AND SENSOR NETWORK ...
This is accomplished through the design and analysis of the interaction. ...
In order to generate interference making use of a frequency hopping system, it is essential to jam the whole band. ...
doi:10.5281/zenodo.10685058
fatcat:wus2i347ynbpdn7lowb2ym2b6u
Sensor deception detection and radio-frequency emitter localization
[article]
2015
A.1 Worst-case fault profile for one-dimensional ship dynamics using two-norm and minimax innovation heuristics. ...
A covert attack is designed to have a high integrity risk and is possible because attacker-induced deviations in the vessel's dynamics can be disguised as the effects of slowly-changing ocean currents ...
To aid in enforcing laws against PPDs and jamming devices, there is a need for a persistent system capable of detecting and locating sources of jamming. ...
doi:10.15781/t2m35k
fatcat:zm5njdpdured7dmvar5micbusm
Threat vector analysis in autonomous driving
[article]
2022
and analysis. ...
to their systems design. ...
Apple CarPlay: Is Apple's standard that enables the connection and interaction between an iOS device and an infotainment system on a vehicle. ...
doi:10.26253/heal.uth.14540
fatcat:5a3jnpgco5eudhefhhrkteygk4
CYBER 2016 The First International Conference on Cyber-Technologies and Cyber-Systems CYBER 2016 Committee CYBER Advisory Committee CYBER 2016 Technical Program Committee
2016
The First International Conference on Advances in Cyber-Technologies and Cyber-Systems (CYBER 2016), held between October 9 and 13
unpublished
Some of new solutions are nature-inspired and social-inspired leading to self-secure and self-defending systems. ...
It was also intended to illustrate appropriate current academic and industry cyber-system projects, prototypes, and deployed products and services. ...
ACKNOWLEDGMENT The authors would like to thank the SimSpace corporation for presenting us with the opportunity and means to conduct this research and solve this difficult problem and the leadership for ...
fatcat:du4jikwafzf4fnvx2stgp44oxa
Detection of Smartphone Malware
[article]
2011
We introduce the fields of dynamic and static analysis. ...
In the field of dynamic analysis, a monitoring system is introduced gathering behavior and system-based information that are processed by a remote system using machine learning for anomaly detection. ...
services like SMS 8 . • GPRS in combination with 2G is often described as 2.5G, as it provides voice and packet data. • W-CDMA 9 was designed as replacement of GSM and is used in the FOMA system in Japan ...
doi:10.14279/depositonce-2885
fatcat:fzfwv6ktwzfaxm6xizimhvbiea
« Previous
Showing results 1 — 15 out of 17 results