Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless technology
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 11:38am
protocol selection
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
cognitive radio
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
radio networks
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
Scalability
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
biblio
Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)
Submitted by aekwall on Tue, 03/09/2021 - 11:36am
Packet loss
ns2
normal network conditions
largest remaining energy
flooding attack AODV routing protocol
Flooding Attack
energy-efficient AODV
energy parameters
different network conditions
Black hole attacks
Vehicular Ad-hoc Network
Performance analysis
wireless technology
Black hole attack
Energy
AODV
Scalability
data communication
Blackhole attack
Throughput
VANET
quality of service
delays
Energy Efficiency
Wireless communication
vehicular ad hoc networks
malicious nodes
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 12:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
Submitted by grigby1 on Thu, 10/29/2020 - 10:57am
Public key
wireless technology
trust value
time analysis
threshold cryptography
telecommunication security
space analysis
Servers
robust cryptography scheme
Resiliency
resilience
Receivers
public string based threshold cryptography
public key cryptography
ad hoc network
pubcrawl
PSTC
mobile ad hoc networks
mobile ad hoc network
Metrics
message privacy
manet privacy
MANET
denial-of-service attack
denial of service
default threshold value
data privacy
Compositionality
biblio
MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications
Submitted by aekwall on Mon, 09/21/2020 - 2:35pm
MIMO communication
Cross Layer Security
wireless networks on-board aircraft
WAICs technology
system design complexity
standard technologies
secure wireless avionics intra-communications
radioaltimeters
physical cross-layer security design
multiple-input multiple-output systems
Medium Access Control
MAC-PRY cross-layer design
internal aeronautics bus technologies
composability
aircraft communication
telecommunication security
wireless technology
Aircraft
access protocols
radiofrequency interference
avionics
Aerospace electronics
Wireless communication
Communication system security
wireless sensor networks
pubcrawl
Resiliency
computer architecture
security
biblio
SystemVue based Secure data transmission using Gold codes
Submitted by grigby1 on Fri, 09/18/2020 - 12:46pm
quadrature amplitude modulation
wireless technology
Wireless communication
wireless channels
Viterbi decoding
Viterbi decoder
transceivers
transceiver
telecommunication security
SystemVue based Secure data transmission
SystemVue
signal to noise ratio graphs
security
Resiliency
resilience
radio transceivers
advanced wireless techniques
pubcrawl
orthogonal frequency division multiplexing modulation scheme
OFDM modulation
OFDM
Metrics
graph theory
gold codes
Gold
error statistics
Cryptography
Convolutional codes
Compositionality
coding theory
channel noise Convolutional code
channel coding
biblio
Physical layer security against cooperative anomaly attack using bivariate data in distributed CRNs
Submitted by grigby1 on Fri, 04/10/2020 - 11:19am
Communication system security
wireless technology
wireless sensor networks
wireless communication network
signal detection
Robust distance measure
radio spectrum management
OSI network model
multiple anomaly detection algorithm
mahalanobis distance measure
Eigenvalues and eigenfunctions
eigenvalue-based sensing
distributed spectrum sensing
Cooperative SSDF attacks
cooperative communication
cooperative anomaly attack
sensors
cognitive radio networks
cognitive radio networking
cognitive radio
bivariate data
Anomaly
wireless channels
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
telecommunication security
Wireless communication
Computational modeling
biblio
Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
mobile computing
wireless technology
telecommunication security
telecommunication network topology
security challenges
security
Routing protocols
Routing
router
Resiliency
resilience
pubcrawl
mobile nodes
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs Security
MANETs Attacks
MANET topology
MANET security
MANET protocol stack
Compositionality
blackhole attacks
base station
biblio
Wireless Security Audit Penetration Test Using Raspberry Pi
Submitted by grigby1 on Mon, 07/01/2019 - 9:03am
Scalability
wireless technology
wireless security audit
Wireless Protected Access
wireless networks
wireless LAN
Wireless fidelity
Wired Equivalent Privacy
WiFi testing tools
WiFi network
WiFi Auditor
WiFi attacks
tools
telecommunication security
Security Audits
auditing
Resiliency
resilience
Raspberry Pi 3 module
pubcrawl
Penetration Testing
penetration tester
man in the middle
Jamming
Human Factors
Human behavior
deliberate jamming
Communication system security
authorized wireless communications
authorisation
biblio
Resilient wireless communication networking for Smart grid BAN
Submitted by BrandonB on Fri, 05/01/2015 - 8:43am
smart grid BAN
network security
network topology
Redundancy
resilience
resilient wireless communication networking
round trip time
RTT
sensor placement
Single-hop network
network reliability
Smart Grids
smart meters
smart power grids
telecommunication network reliability
telecommunication network topology
telecommunication security
Wireless communication
wireless LAN
wireless technology
hybrid deployment
building area network
control centre
demand response function
distribution level
DR communication
end to end delay
home area network
home automation
home networks
backbone networks
IEEE 802.11 communication technology
IEEE 802.11 Standards
Infrastructure mode
infrastructure mode smart meter network
infrastructure single hop topology
mesh multiple hop topology
Multi-hop mesh network
network failure
1
2
next ›
last »