Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious node
biblio
Security-Aware Malicious Event Detection using Multivariate Deep Regression Setup for Vehicular Ad hoc Network Aimed at Autonomous Transportation System
Submitted by grigby1 on Fri, 12/09/2022 - 5:29pm
Transportation
Ad Hoc Network Security
Urban VANET
Misbehavior detection
malicious node
mobile nodes
Sybil attack
vehicular ad hoc networks
Scalability
signal processing
real-time systems
composability
Wireless communication
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Mitigating unsecured data forwarding related attack of underwater sensor network
Submitted by grigby1 on Fri, 05/06/2022 - 3:25pm
malicious node
Unsecure data forwarding
UnetStack
Underwater Sensor Network
attacks and their mitigation approaches
location awareness
Underwater Networks
underwater communication
Tsunami
security
data communication
Scalability
Software algorithms
Metrics
wireless sensor networks
Resiliency
resilience
pubcrawl
biblio
Sufficient and Necessary Condition for Resilient Consensus under Time-Varying Topologies
Submitted by grigby1 on Mon, 11/29/2021 - 12:33pm
\\ s$-robustness
Computational modeling
Human Factors
joint $r
malicious node
multi-agent systems
network topology
numerical simulation
pubcrawl
resilient consensus
Robustness
Scalability
Social Agents
switching topologies
time-varying systems
Topology
biblio
Classification of Misbehaving nodes in MANETS using Machine Learning Techniques
Submitted by aekwall on Mon, 08/02/2021 - 2:12pm
Neural networks
Support vector machines
Analytical models
pubcrawl
Metrics
Resiliency
machine learning
Compositionality
Throughput
Ad hoc networks
mobile computing
BPNN
malicious node
Mobile Ad-Hoc Network (MANET)
SVM
MANET security
biblio
Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 1:57pm
pubcrawl
wireless sensor networks
Underwater Networks
Topology
security
Scalability
Routing
Resiliency
resilience
Computational modeling
Open Source Software
Metrics
malicious node
localization
Impersonate
Hash functions
delays
Cyber Physical System
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
telecommunication computing
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
markov chain
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
gradient methods
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
Acoustic Fingerprints
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 12:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
Securing Vehicular Adhoc Network against Malicious Vehicles using Advanced Clustering Technique
Submitted by grigby1 on Mon, 12/28/2020 - 12:02pm
pattern clustering
vehicular adhoc network
vehicular ad hoc networks
VANET network
VANET
unique topics
telecommunication security
telecommunication network topology
security network
security
scientist
Resiliency
resilience
pubcrawl
predictable mobility
ad hoc network
network productivity
mobile radio
Metrics
malicious vehicles
malicious node
high dynamic network
high dynamic nature
good clustering algorithm
emerging topics
Compositionality
clustering technique
CH(cluster head)
advanced clustering technique
Ad hoc networks
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
biblio
Secure DSR Routing from Malicious Node by PGP Encryption
Submitted by grigby1 on Thu, 10/29/2020 - 10:59am
Routing protocols
pubcrawl
Public key
resilience
Resiliency
Route cache
route reply control messages
route request
Routing
PGP
RREP
RREP control message
RREQ
RREQ control message
secure DSR Routing
telecommunication security
UIV
weather RREP
malicious node
Cryptography
data transmission source
demand wireless communication
destination source
Dsr
dynamic source routing
encryption
intermediate node
Compositionality
MANET
manet privacy
MANET reactive routing protocol
Metrics
mobile ad hoc network
mobile ad hoc networks
neighbor nodes
Peer-to-peer computing
1
2
3
next ›
last »