Antifragile Communications
暂无分享,去创建一个
Jeffrey H. Reed | T. Charles Clancy | Marc Lichtman | Matthew Vondal | T. Clancy | Marc Lichtman | Matthew Vondal
[1] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[2] S. Chuprun,et al. Comparison of FH/CDMA and DS/CDMA for wireless survivable networks , 1998, Proceedings RAWCON 98. 1998 IEEE Radio and Wireless Conference (Cat. No.98EX194).
[3] Jeffrey H. Reed,et al. Anomaly-based intrusion detection of protocol-aware jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[4] Hung Nguyen-Le,et al. ML-based follower jamming rejection in slow FH/MFSK systems with an antenna array , 2008, IEEE Transactions on Communications.
[5] Jeffrey H. Reed,et al. Analysis and Mitigation of Interference to the LTE Physical Control Format Indicator Channel , 2014, 2014 IEEE Military Communications Conference.
[6] A. Nejat İnce. Digital speech processing : speech coding, synthesis, and recognition , 1992 .
[7] Antoine Danchin,et al. Antifragility and Tinkering in Biology (and in Business) Flexibility Provides an Efficient Epigenetic Way to Manage Risk , 2011, Genes.
[8] R. Michael Buehrer,et al. Optimal Jamming Against Digital Modulation , 2015, IEEE Transactions on Information Forensics and Security.
[9] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[10] Arnaud Gorgeon. Anti-Fragile Information Systems , 2015, ICIS.
[11] Alexander M. Wyglinski,et al. A combined approach for distinguishing different types of jamming attacks against wireless networks , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[12] Jeffrey H. Reed,et al. Reinforcement Learning for Reactive Jamming Mitigation , 2014, J. Cyber Secur. Mobil..
[13] Hannu Tenhunen,et al. Positioning Antifragility for Clouds on Public Infrastructures , 2014, ANT/SEIT.
[14] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[15] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[16] Jingbo Guo,et al. Feasibility Assessment of Repeater Jamming Technique for DSSS , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[17] R. Michael Buehrer,et al. A communications jamming taxonomy , 2016, IEEE Security & Privacy.
[18] Roger Piqueras Jover,et al. LTE/LTE-A jamming, spoofing, and sniffing: threat assessment and mitigation , 2016, IEEE Communications Magazine.
[19] Jeffrey H. Reed,et al. PHY-Layer Resiliency in OFDM Communications: A Tutorial , 2015, IEEE Communications Surveys & Tutorials.
[20] Jr. K.L. Jordan. The Performance of Sequential Decoding in Conjunction with Efficient Modulation , 1966 .
[21] Mihaela van der Schaar,et al. A systematic learning method for optimal jamming , 2015, 2015 IEEE International Conference on Communications (ICC).
[22] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[23] Harry R. Anderson,et al. Fixed Broadband Wireless System Design , 2003 .
[24] R. Michael Buehrer,et al. Optimal jamming strategies in digital communications — Impact of modulation , 2014, 2014 IEEE Global Communications Conference.
[25] Taieb Znati,et al. A Novel Approach Against Reactive Jamming Attacks , 2011, Ad Hoc Sens. Wirel. Networks.
[26] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[27] Rich Caruana,et al. An empirical comparison of supervised learning algorithms , 2006, ICML.
[28] Piet Van Mieghem,et al. Data communications networking , 2006 .
[29] Youping Zhao,et al. Enabling Cognitive Radios through Radio Environment Maps , 2007 .
[30] Giuseppe Primiero,et al. A Framework for Trustworthiness Assessment based on Fidelity in Cyber and Physical Domains , 2015, ANT/SEIT.
[31] Maher Ben Jemaa,et al. Toward Antifragile Cloud Computing Infrastructures , 2014, ANT/SEIT.
[32] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[33] Eric Verhulsta. Applying Systems and Safety Engineering Principles for Antifragility , 2014 .
[34] Mark A. Richards,et al. Fundamentals of Radar Signal Processing , 2005 .
[35] T. Charles Clancy,et al. Security Challenges with LTE-Advanced Systems and Military Spectrum , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[36] Tamer Basar,et al. With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .
[37] Robert W. Lucky. Antifragile systems [Reflections] , 2013 .
[38] Shabnam Sodagari,et al. An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks , 2011, GameSec.
[39] Jeffrey H. Reed,et al. Detection and Mitigation of Uplink Control Channel Jamming in LTE , 2014, 2014 IEEE Military Communications Conference.
[40] Gregory W. Wornell,et al. Energy-efficient antenna sharing and relaying for wireless networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[41] Matthew J. P. Baker,et al. Downlink Physical Data and Control Channels , 2011, LTE - The UMTS Long Term Evolution.
[42] Aldri Santos,et al. Resilience and Knowledge in a Metric for Heterogeneous Wireless Connectivity , 2013 .
[43] Wenyuan Xu,et al. Anti-jamming timing channels for wireless networks , 2008, WiSec '08.
[44] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[45] David L. Adamy,et al. EW 102: A Second Course in Electronic Warfare , 2004 .
[46] Nagarajan Kandasamy,et al. A real-time and protocol-aware reactive jamming framework built on software-defined radios , 2014, SRIF@SIGCOMM.
[47] Makoto Itoh,et al. An initial approach towards the implementation of human error identification services for antifragile systems , 2014, 2014 Proceedings of the SICE Annual Conference (SICE).
[48] Janise McNair,et al. A Survey of Communication Sub-systems for Intersatellite Linked Systems and CubeSat Missions , 2012, J. Commun..
[49] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[50] Vincenzo De Florio,et al. On environments as systemic exoskeletons: crosscutting optimizers and antifragility enablers , 2015, Journal of Reliable Intelligent Environments.
[51] David Grace,et al. Cognitive radio with reinforcement learning applied to heterogeneous multicast terrestrial communication systems , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[52] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[53] K. McKernan,et al. The chloroplast genome hidden in plain sight, open access publishing and anti-fragile distributed data sources , 2016, Mitochondrial DNA. Part A, DNA mapping, sequencing, and analysis.
[54] Vincenzo De Florio,et al. Antifragility = Elasticity + Resilience + Machine Learning: Models and Algorithms for Open System Fidelity , 2014, ANT/SEIT.
[55] Bo Li,et al. Optimal Adaptive Antijamming in Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[56] L. Kleinrock,et al. Packet Switching in Radio Channels: Part I - Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics , 1975, IEEE Transactions on Communications.
[57] R. Michael Buehrer,et al. Optimal Jamming using Delayed Learning , 2014, 2014 IEEE Military Communications Conference.
[58] Kennie H. Jones. International Workshop : From Dependable to Resilient , from Resilient to Antifragile Ambients and Systems ( ANTIFRAGILE 2014 ) Engineering Antifragile Systems : A Change In Design Philosophy , 2014 .
[59] Kjell Jørgen Hole. Toward Anti-fragility: A Malware-Halting Technique , 2015, IEEE Security & Privacy.
[60] Angel P. del Pobil,et al. Fostering Progress in Performance Evaluation and Benchmarking of Robotic and Automation Systems [TC Spotlight] , 2014, IEEE Robotics & Automation Magazine.
[61] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[62] Giuseppe Primiero,et al. Software Theory Change for Resilient Near-Complete Specifications , 2015, ANT/SEIT.
[63] Hüseyin Arslan,et al. Sidelobe suppression in OFDM-based spectrum sharing systems using adaptive symbol transition , 2008, IEEE Communications Letters.
[64] David J. Thuente,et al. Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .
[65] Mihaela van der Schaar,et al. Jamming Bandits—A Novel Learning Method for Optimal Jamming , 2016, IEEE Transactions on Wireless Communications.
[66] M. Win,et al. Analysis of hybrid selection/maximal-ratio combining of diversity branches with unequal SNR in Rayleigh fading , 1999, 1999 IEEE 49th Vehicular Technology Conference (Cat. No.99CH36363).
[67] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[68] Paramvir Bahl,et al. Distributed fair scheduling in a wireless LAN , 2000, IEEE Transactions on Mobile Computing.
[69] Injong Rhee,et al. DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.
[70] K. J. Ray Liu,et al. Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[71] Carole L. Palmer,et al. Value and context in data use: Domain analysis revisited , 2012, ASIST.
[72] J.D. Mosinski. Electronic countermeasures , 1992, [1992] Proceedings of the Tactical Communications Conference.
[73] C. Goose,et al. Glossary of Terms , 2004, Machine Learning.
[74] Mihaela van der Schaar,et al. To Send or Not to Send - Learning MAC Contention , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[75] Jim Miller,et al. Spectrum Management Issues Related to the AEHF System , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[76] Ivan Martinovic,et al. Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.
[77] Jeffrey H. Reed,et al. Automatic Modulation Classification under IQ Imbalance Using Supervised Learning , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[78] T. Charles Clancy,et al. Protecting physical layer synchronization: mitigating attacks against OFDM acquisition , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[79] Norman M. Abramson,et al. THE ALOHA SYSTEM: another alternative for computer communications , 1899, AFIPS '70 (Fall).
[80] Roger Piqueras Jover,et al. Enhancing the security of LTE networks against jamming attacks , 2014, EURASIP J. Inf. Secur..
[81] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[82] Ariel Tseitlin,et al. The antifragile organization , 2013, CACM.
[83] Michael R. Souryal,et al. LTE Physical Layer Performance Analysis , 2014 .
[84] Vincenzo De Florio. On resilient behaviors in computational systems and environments , 2015, Journal of Reliable Intelligent Environments.
[85] Jingbo Guo,et al. Evaluation of Security for DSSS Under Repeater Jamming , 2007, 2007 IEEE International Conference on Communications.
[86] Peng Ning,et al. BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.
[87] Dongweon Yoon,et al. On the general BER expression of one- and two-dimensional amplitude modulations , 2002, IEEE Trans. Commun..
[88] Srdjan Capkun,et al. Detection of reactive jamming in sensor networks , 2010, TOSN.
[89] Davor Svetinovic,et al. Identifying signs of systems fragility: A crowdsourcing requirements case study , 2013, 2013 IEEE International Conference on Industrial Engineering and Engineering Management.
[90] Saurabh Mittal,et al. Model engineering for cyber complex adaptive systems , 2014 .
[91] Keith D. Swenson. Designing for an Innovative Learning Organization , 2013, 2013 17th IEEE International Enterprise Distributed Object Computing Conference.
[92] Mostafa Kaveh,et al. Exact symbol error probability of a Cooperative network in a Rayleigh-fading environment , 2004, IEEE Transactions on Wireless Communications.
[93] Hai Jiang,et al. Energy Detection for Spectrum Sensing in Cognitive Radio , 2014, SpringerBriefs in Computer Science.
[94] Jeffrey H. Reed,et al. Vulnerability of LTE to hostile interference , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[95] Paolo Ciancarini,et al. A Proposal for an Antifragile Software Manifesto , 2016, ANT/SEIT.
[96] Jeffrey H. Reed,et al. Analysis of reactive jamming against satellite communications , 2016, Int. J. Satell. Commun. Netw..
[97] Sergio Verdú,et al. A general formula for channel capacity , 1994, IEEE Trans. Inf. Theory.
[98] Gordon L. Stüber,et al. Analysis of OFDM/MC-CDMA under channel estimation and jamming , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[99] I. M. Jacobs,et al. Principles of Communication Engineering , 1965 .
[100] Vuk Marojevic,et al. Analyzing and enhancing the resilience of LTE/LTE-A systems to RF spoofing , 2015, 2015 IEEE Conference on Standards for Communications and Networking (CSCN).
[101] Erol Gelenbe,et al. Storms in mobile networks , 2014, Q2SWinet '14.
[102] William M. Kroshl,et al. Detecting antifragile decisions and models lessons from a conceptual analysis model of Service Life Extension of aging vehicles , 2014, 2014 IEEE International Systems Conference Proceedings.
[103] T. Charles Clancy,et al. Efficient OFDM Denial: Pilot Jamming and Pilot Nulling , 2011, 2011 IEEE International Conference on Communications (ICC).
[104] Xiaofu Ma,et al. Practical Issues for Spectrum Management With Cognitive Radios , 2014, Proceedings of the IEEE.
[105] Anant Sahai,et al. SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.
[106] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[107] Louis J. Ippolito,et al. Attenuation by Atmospheric Gases , 1986 .
[108] Laura Galluccio,et al. Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis , 2015, IEEE Transactions on Wireless Communications.
[109] Jin-Ghoo Choi,et al. Flexible and efficient aggregation framework for antifragile wireless mesh networks , 2015, Journal of Reliable Intelligent Environments.
[110] Wayne E. Stark,et al. Capacity and Cutoff Rate of Noncoherent FSK with Nonselective Rician Fading , 1985, IEEE Trans. Commun..
[111] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[112] Murat Çakiroglu,et al. Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.
[113] Syed Asad Hussain,et al. Taxonomy and issues for antifragile-based multimedia cloud computing , 2016, Journal of Reliable Intelligent Environments.
[114] Don J. Torrieri,et al. Fundamental limitations on repeater jamming of frequency-hopping communications , 1989, IEEE J. Sel. Areas Commun..
[115] Ivan Cosovic,et al. Sidelobe Suppression in OFDM Systems , 2006 .
[116] Stefano Marrone,et al. Automatic Resource Allocation for High Availability Cloud Services , 2015, ANT/SEIT.
[117] Pil Lee. Computation of the Bit Error Rate of Coherent M-ary PSK with Gray Code Bit Mapping , 1986, IEEE Trans. Commun..
[118] Saidhiraj Amuru. Intelligent Approaches for Communication Denial , 2015 .
[119] Michael Schnell,et al. Reduction of out-of-band radiation in OFDM systems by insertion of cancellation carriers , 2006, IEEE Communications Letters.
[120] N. Taleb. Antifragile: Things That Gain from Disorder , 2012 .
[121] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[122] Yang Xiao,et al. IEEE 802.11n: enhancements for higher throughput in wireless LANs , 2005, IEEE Wireless Communications.
[123] Michael Schnell,et al. Subcarrier weighting: a method for sidelobe suppression in OFDM systems , 2006, IEEE Communications Letters.
[124] Timothy Pratt,et al. Satellite communications , 1986 .
[125] James R. Wertz,et al. Space Mission Analysis and Design , 1992 .