Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Spectrum Access System Privacy“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Spectrum Access System Privacy" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Spectrum Access System Privacy"
Clark, Matthew A., und Konstantinos Psounis. „Trading Utility for Privacy in Shared Spectrum Access Systems“. IEEE/ACM Transactions on Networking 26, Nr. 1 (Februar 2018): 259–73. http://dx.doi.org/10.1109/tnet.2017.2778260.
Der volle Inhalt der QuelleZhang, Mengyuan, Jiming Chen, Shibo He, Lei Yang, Xiaowen Gong und Junshan Zhang. „Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach“. IEEE Transactions on Industrial Electronics 67, Nr. 8 (August 2020): 7094–103. http://dx.doi.org/10.1109/tie.2019.2938491.
Der volle Inhalt der QuelleAhmed, Iqrar, Heikki Karvonen, Timo Kumpuniemi und Marcos Katz. „Wireless Communications for the Hospital of the Future: Requirements, Challenges and Solutions“. International Journal of Wireless Information Networks 27, Nr. 1 (28.10.2019): 4–17. http://dx.doi.org/10.1007/s10776-019-00468-1.
Der volle Inhalt der QuelleSun, Guiling, Weijian Zhao, Ruobin Wang und Xuanjie Li. „Design of Ethernet-VLC Data Conversion System Based on FPGA“. International Journal of Computer Theory and Engineering 12, Nr. 3 (2020): 69–73. http://dx.doi.org/10.7763/ijcte.2020.v12.1266.
Der volle Inhalt der QuelleVorakulpipat, Chalee, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn und Visut Savangsuk. „A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives“. Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2057260.
Der volle Inhalt der QuelleZong Chen, Joy Iong, und Kong-Long Lai. „Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study“. December 2020 2, Nr. 4 (19.01.2021): 236–45. http://dx.doi.org/10.36548/jscp.2020.4.005.
Der volle Inhalt der QuelleMitrea, Teodor, Vlad Vasile und Monica Borda. „Mobile Applications - (in) Security Overview“. International conference KNOWLEDGE-BASED ORGANIZATION 25, Nr. 3 (01.06.2019): 42–45. http://dx.doi.org/10.2478/kbo-2019-0115.
Der volle Inhalt der QuelleSzydłowski, Dariusz, und Kamil Martyniak. „Contemporary threats related to content processing in the cyberspace“. ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 23, Nr. 1 (30.04.2019): 13–17. http://dx.doi.org/10.5604/01.3001.0013.1759.
Der volle Inhalt der QuellePetrenko, Christie LM, Jennifer Parr, Carson Kautz, Cristiano Tapparello und Heather Carmichael Olson. „A Mobile Health Intervention for Fetal Alcohol Spectrum Disorders (Families Moving Forward Connect): Development and Qualitative Evaluation of Design and Functionalities“. JMIR mHealth and uHealth 8, Nr. 4 (06.04.2020): e14721. http://dx.doi.org/10.2196/14721.
Der volle Inhalt der QuelleGwynette, McLeod Frampton, Danielle Morriss, Nancy Warren, James Truelove, Jennifer Warthen, Charles Paul Ross, George Mood, Charlotte Anne Snook und Jeffrey Borckardt. „Social Skills Training for Adolescents With Autism Spectrum Disorder Using Facebook (Project Rex Connect): A Survey Study“. JMIR Mental Health 4, Nr. 1 (23.01.2017): e4. http://dx.doi.org/10.2196/mental.6605.
Der volle Inhalt der QuelleDissertationen zum Thema "Spectrum Access System Privacy"
Makin, Cameron. „Primary User Obfuscation in an Incumbent Informed Spectrum Access System“. Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.
Der volle Inhalt der QuelleMaster of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
Dou, Yanzhi. „Toward Privacy-Preserving and Secure Dynamic Spectrum Access“. Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81882.
Der volle Inhalt der QuellePh. D.
Lu, Chang. „Inclusion of Priority Access in a Privacy-preserving ESC-based DSA System“. Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/84872.
Der volle Inhalt der QuelleMaster of Science
Zabransky, Douglas Milton. „Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems“. Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.
Der volle Inhalt der QuelleMaster of Science
Lin, Yousi. „Spectrum Management Issues in Centralized and Distributed Dynamic Spectrum Access“. Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104362.
Der volle Inhalt der QuelleDoctor of Philosophy
Due to the rapid growth in wireless communication demands, the frequency spectrum is becoming increasingly crowded. Traditional spectrum allocation policy gives the unshared access of fixed bands to the licensed users, and there is little unlicensed spectrum left now to allocate to newly emerged communication demands. However, studies on spectrum occupancy show that many licensed users who own the license of certain bands are only active for a small percentage of time, which results in plenty of underutilized spectrum. Hence, a new spectrum sharing paradigm, called dynamic spectrum access (DSA), is proposed to mitigate this problem. DSA enables the spectrum sharing between different classes of users, generally, the unlicensed users in the DSA system can access the licensed spectrum opportunistically without interfering with the licensed users. Based on architecture design, DSA systems can be categorized as centralized and distributed. In centralized systems, a central controller will make decisions on spectrum usage for all unlicensed users. Whereas in distributed systems, unlicensed users can make decisions for themselves independently. To successfully enable DSA, both centralized and distributed DSA systems need to deal with spectrum management issues, such as resource allocation problems and user privacy issues, etc. The resource allocation problems include, for example, the problems to discover and allocate idle bands and the problems to control users' transmit power for successful coexistence. Privacy issues may also arise during the spectrum management process since certain information exchange is inevitable for global decision making. However, due to the Federal Communications Commission's (FCC) regulation, licensed users' privacy such as their location information must be protected in any case. As a result, dynamic and efficient spectrum management techniques are necessary for DSA users. In this dissertation, we investigate the above-mentioned spectrum management issues in both types of DSA systems, specifically, the spectrum sensing challenges with licensed user location privacy issues in centralized DSA, and the spectrum sharing problems in distributed DSA systems. In doing so, we propose novel schemes for solving each related spectrum management problem and demonstrate their efficacy through the results from extensive evaluations and simulations. We believe that this dissertation provides insightful advice for DSA users to solve different spectrum management issues for enabling DSA implementation, and hence helps in a wider adoption of dynamic spectrum sharing.
Bhadriraju, Abhay Rao. „Misuse Detection in Dynamic Spectrum Access Networks“. Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/49259.
Der volle Inhalt der QuelleMaster of Science
Ullah, Abid. „Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System“. Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/84932.
Der volle Inhalt der QuellePh. D.
Ye, Yuxian. „Study of Sensing Issues in Dynamic Spectrum Access“. Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/90184.
Der volle Inhalt der QuelleMaster of Science
Spectrum relates to the radio frequencies allocated to the federal users and commercial users for communication over the airwaves. It is a sovereign asset that is overseen by the government in each country to manage the radio spectrum and issue spectrum licenses. In addition, spectrum bands are utilized for various purposes because different bands have different characteristics. However, the overly crowded US frequency allocation chart shows the scarcity of usable radio frequencies. The actual spectrum usage measurements reflect that multiple prized spectrum bands lay idle at most time and location, which indicates that the spectrum shortage is caused by the spectrum management policies rather than the physical scarcity of available frequencies. Dynamic spectrum access (DSA) was proposed as a new paradigm of spectrum sharing that allows commercial users to access the abundant white spaces in the licensed spectrum bands to mitigate the spectrum shortage problem and increase spectrum utilization. In DSA, two of the key technical challenges lie in how to dynamically allocate the spectrum and how to protect spectrum users’ security. This thesis focuses on the development of two types of mechanisms for addressing the above two challenges: (1) developing efficient spectrum monitoring schemes to help secondary users (SU) to accurately and dynamically access the white space in spectrum allocation and (2) developing privacy preservation schemes for incumbent users (IU) to protect their location privacy. Specifically, we proposed an unknown IU pattern monitoring scheme that leverages the power of masses of portable mobile devices to reduce the cost of common spectrum monitoring systems. We demonstrate that our system can track not only the existing IU spectrum access patterns but also the unknown patterns where no historical spectrum information exists. We then leverage the solar energy harvesting and design energy management scheme to support our spectrum monitoring system. Finally, we provide a strategy for both static and mobile IUs to hide their true location under the monitoring of Environmental Sensing Capabilities systems.
Bahrak, Behnam. „Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing“. Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/24720.
Der volle Inhalt der QuellePh. D.
Maggenti, Mark A. „Spread spectrum satellite multiple access and overlay service“. Thesis, Virginia Tech, 1987. http://hdl.handle.net/10919/45769.
Der volle Inhalt der QuelleThis thesis presents two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks. It describes two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation and analyzes their throughput. The analysis considers such factors as satellite power constraints and adjacent satellite interference. It considers the effect of onâ board processing on the multiple access efficiency and investigates the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse.
Master of Science
Bücher zum Thema "Spectrum Access System Privacy"
Nagel, Wil. "Privacy schmrivacy?": Drafting privacy policy in an integrated justice environment (and why it's important) : Illinois Integrated Justice Information System. Chicago, Ill: Illinois Criminal Justice Information Authority, 2004.
Den vollen Inhalt der Quelle findenAleksandar, Damnjanovic, und Vojcic Branimir, Hrsg. The cdma2000® system for mobile communications. Upper Saddle River, NJ: Prentice Hall PTR, 2004.
Den vollen Inhalt der Quelle findenG, Straus Susan, Hrsg. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. Santa Monica, CA: RAND, 2013.
Den vollen Inhalt der Quelle findenGounaris, Anieli. Spies and snitches: Electronic privacy protection and challenges. Hauppauge, N.Y: Nova Science Publishers, 2011.
Den vollen Inhalt der Quelle findenRegulating the credit bureau system in South Korea: Toward new legislative approach to ensuring the accuracy and privacy of consumer credit information. 2005.
Den vollen Inhalt der Quelle findenRegulating the credit bureau system in South Korea: Toward new legislative approach to ensuring the accuracy and privacy of consumer credit information. [S.l: s.n., 2005.
Den vollen Inhalt der Quelle findenInc, QUALCOMM, und Telecommunications Industry Association. TR45 Committee., Hrsg. Proposed wideband spread spectrum standard: Digital cellular system CDMA-analog dual-mode mobile station-base station compatibility standard. [United States]: QUALCOMM, 1992.
Den vollen Inhalt der Quelle findenSvantesson, Dan Jerker B., und Rebecca Azzopardi. Systematic Government Access to Private-Sector Data in Australia. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0010.
Der volle Inhalt der QuelleTsuchiya, Motohiro. Systematic Government Access to Private-Sector Data in Japan. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0013.
Der volle Inhalt der QuelleInformation Security Theory and Practices Security and Privacy of Pervasive Systems and Smart Devices Lecture Notes in Computer Science. Springer, 2010.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Spectrum Access System Privacy"
Li, He, Yaling Yang, Yanzhi Dou, Chang Lu, Doug Zabransky und Jung-Min Park. „Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 55–65. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05490-8_6.
Der volle Inhalt der QuelleArdagna, Claudio Agostino, Sabrina De Capitani di Vimercati, Eros Pedrini und Pierangela Samarati. „Privacy-Aware Access Control System: Evaluation and Decision“. In Digital Privacy, 377–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_14.
Der volle Inhalt der QuelleCabrera, Annu. „Towards a National Remote Access System for Register-Based Research“. In Privacy in Statistical Databases, 181–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45381-1_14.
Der volle Inhalt der QuelleBerthold, Oliver, Hannes Federrath und Stefan Köpsell. „Web MIXes: A System for Anonymous and Unobservable Internet Access“. In Designing Privacy Enhancing Technologies, 115–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44702-4_7.
Der volle Inhalt der QuelleSydor, John. „Coral Cognitive WiFi Networking System“. In Opportunistic Spectrum Sharing and White Space Access, 123–40. Hoboken, NJ: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119057246.ch6.
Der volle Inhalt der QuelleRohling, Hermann, Karsten Brüninghaus und Rainer Grünheid. „Comparison of Multiple Access Schemes for an OFDM Downlink System“. In Multi-Carrier Spread-Spectrum, 23–30. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6231-3_3.
Der volle Inhalt der QuelleSpalka, Adrian, Armin B. Cremers und Hartmut Lehmler. „Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System“. In Information Security and Privacy, 1–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10718964_1.
Der volle Inhalt der QuelleKolter, Jan, Rolf Schillinger und Günther Pernul. „A Privacy-Enhanced Attribute-Based Access Control System“. In Data and Applications Security XXI, 129–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73538-0_11.
Der volle Inhalt der QuelleIslam, Muhammad Nazmul, Narayan B. Mandayam, Ivan Seskar und Sastry Kompella. „System Power Minimization in Non-contiguous Spectrum Access“. In Handbook of Cognitive Radio, 1–30. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-1389-8_24-1.
Der volle Inhalt der QuelleIslam, Muhammad Nazmul, Narayan B. Mandayam, Ivan Seskar und Sastry Kompella. „System Power Minimization in Non-contiguous Spectrum Access“. In Handbook of Cognitive Radio, 839–68. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-1394-2_24.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Spectrum Access System Privacy"
Dou, Yanzhi, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao und Kui Ren. „Preserving Incumbent Users’ Privacy in Exclusion-Zone-Based Spectrum Access Systems“. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.322.
Der volle Inhalt der QuelleDou, Yanzhi, He Li, Kexiong Zeng, Jinshan Liu, Yaling Yang, Bo Gao und Kui Ren. „Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems“. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2016. http://dx.doi.org/10.1109/icdcs.2016.40.
Der volle Inhalt der QuelleDou, Yanzhi, Kexiong (Curtis) Zeng, Yaling Yang und Kui Ren. „Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems“. In MobiCom'16: The 22nd Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2973750.2985283.
Der volle Inhalt der QuelleGuan, Chaowen, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren und Yaling Yang. „When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access“. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.75.
Der volle Inhalt der QuelleTroja, Erald, und Spiridon Bakiras. „Leveraging P2P interactions for efficient location privacy in database-driven dynamic spectrum access“. In SIGSPATIAL '14: 22nd SIGSPATIAL International Conference on Advances in Geographic Information Systems. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2666310.2666477.
Der volle Inhalt der QuelleTroja, Erald, und Joshua Gitter. „Privacy-preserving Crowd-sensing for Dynamic Spectrum Access“. In MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM). IEEE, 2019. http://dx.doi.org/10.1109/milcom47813.2019.9020713.
Der volle Inhalt der QuelleBahrak, Behnam, Sudeep Bhattarai, Abid Ullah, Jung-Min Jerry Park, Jeffery Reed und David Gurney. „Protecting the primary users' operational privacy in spectrum sharing“. In 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2014. http://dx.doi.org/10.1109/dyspan.2014.6817800.
Der volle Inhalt der QuelleTroja, Erald, und Ice Lin. „Fraud-resilient Privacy-preserving Crowd-sensing for Dynamic Spectrum Access“. In 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring). IEEE, 2021. http://dx.doi.org/10.1109/vtc2021-spring51267.2021.9448648.
Der volle Inhalt der QuelleAnjum, Md Monowar, und Noman Mohammed. „PAARS: Privacy Aware Access Regulation System“. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2020. http://dx.doi.org/10.1109/uemcon51285.2020.9298048.
Der volle Inhalt der QuelleRajkarnikar, Nirajan, Jon M. Peha und Ana Aguiar. „Location privacy from dummy devices in database-coordinated spectrum sharing“. In 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2017. http://dx.doi.org/10.1109/dyspan.2017.7920796.
Der volle Inhalt der Quelle