Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
A Flexible Anti-Jamming Channel Hopping for Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 9:56am
LAA scheme
wireless channels
traffic load
Topology
Throughput
telecommunication security
SU node
Resiliency
resilience
pubcrawl
Protocols
Oceans
Load modeling
load awareness anti-jamming channel hopping scheme
anti-jamming channel hopping protocol
Jamming
frequency hop communication
flexible anti-jamming channel hopping
Extended Langford pairing (ELP)
CRN
computer science
Cognitive Radio Security
Cognitive radio networks (CRNs)
cognitive radio networks
cognitive radio
channel hopping sequences
Anti-jamming strategy
biblio
Universal Framework for Vulnerability Assessment of Power Grid Based on Complex Networks
Submitted by grigby1 on Tue, 11/19/2019 - 2:42pm
power system
weighted betweenness evaluation index
weighted betweenness
vulnerability assessment
virtual edge weight
universal method
universal framework
unified weighting model
Topology
Resiliency
resilience
pubcrawl
power system stability
power system security
complex network theory
power grids
power grid vulnerability assessment methods
power grid vulnerability analysis
nodes vulnerability
network theory (graphs)
Metrics
Indexes
Generators
edges vulnerability
distinct weighted complex network model
composability
complex networks
biblio
Location Determination by Processing Signal Strength of Wi-Fi Routers in the Indoor Environment with Linear Discriminant Classifier
Submitted by grigby1 on Mon, 11/04/2019 - 11:39am
Metrics
wireless LAN
Wireless fidelity
Wi-Fi signal values
Wi-Fi signal strength
Wi-Fi routers
Topology
statistical analysis
signal classification
Router Systems Security
Resiliency
resilience
pubcrawl
classification
Mathematical model
machine learning algorithms
location determination
linear discriminant analysis classification
Linear discriminant analysis
indoor radio
indoor location determination
Global Positioning System signals
Global Positioning System
Fingerprint recognition
Classification algorithms
biblio
A Novel Route Randomization Approach for Moving Target Defense
Submitted by aekwall on Mon, 09/09/2019 - 9:48am
Monitoring
IP networks
software defined networking
moving target defense
Resiliency
pubcrawl
Routing protocols
network topology
control systems
Topology
Scalability
forwarding routes
route randomization
Software Defined Network
Time-frequency Analysis
Predictive Metrics
biblio
Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks
Submitted by aekwall on Mon, 06/24/2019 - 2:00pm
Resiliency
policy-based governance
power system security
privacy
privacy concerns
privacy preserving fine-grained data distribution aggregation
pubcrawl
Public key
real-time fine-grained monitoring
real-time systems
parent smart meter
Smart Grid
smart grid AMI networks
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Metering
smart meters
smart power grids
Topology
fine-grained consumption
collected metering data
Companies
consumption distribution
data privacy
distribution
energy consumption
energy consumption data
energy demand forecasting
fine-grained
advanced metering infrastructure
fine-grained metering data reporting
future energy production
Human behavior
individual consumers
intended demand response service
Metrics
network topology
network tree topology structure
biblio
Resilient consensus protocol in the presence of trusted nodes
Submitted by willirn1 on Thu, 05/30/2019 - 1:51pm
resilience
Vanderbilt
dominating set
adversary
graph robustness
Consensus
Buildings
Tree graphs
Topology
network topology
network theory (graphs)
Robustness
Protocols
connected dominating set
adversarial attacks
nonlocal information access
resilient distributed consensus problem
trusted nodes notion
resilient consensus protocol
biblio
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
network systems security
Topology
Time-independent Hierarchical Attack Representation Model
Time independent security analysis
Servers
security of data
security models
Security analysis
security
Resiliency
pubcrawl
network topology
Dynamic Networks and Security
Metrics
GSM
graphical security models
graphical security model
graph theory
Dynamical Systems
Dynamic Network
Databases
cyber security
composability
Analytical models
biblio
Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor Networks
Submitted by grigby1 on Fri, 10/26/2018 - 3:51pm
real-world data
WSN platforms
wireless sensor networks
turbo codes
Topology
telecommunication network topology
Task Analysis
sophisticated communication mechanisms
simple communication protocols
short range multihop topologies
sensor nodes
security
Scalability
Resiliency
composability
pubcrawlBase stations
pubcrawl
Protocols
multihop wireless sensor networks
multihop extended star topologies
Metrics
forward-error correction schemes
forward error correction paradigm
forward error correction
energy resources
energy consumption
Decoding
computational energy resources
biblio
Flooding attack detection and prevention in MANET based on cross layer link quality assessment
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
link layer assessment based flooding attack detection
Topology
telecommunication security
telecommunication network routing
routing table
Routing
Resiliency
resilience
pubcrawl
network topology
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
accurate flooding attack detection
flooding node detection
Flooding Attack
Distributed Denial of Services attack
DDoS Attack
DDoS
cross layer MAC-Network interface
cross layer link quality assessment
Cross layer design
Cross Layer
Computer crime
Compositionality
Attack detection
biblio
The performance comparison of forwarding mechanism between IPv4 and Named Data Networking (NDN). Case study: A node compromised by the prefix hijack
Submitted by grigby1 on Mon, 06/11/2018 - 2:37pm
NDN
transport protocols
Topology
telecommunication network routing
Scalability
Routing protocols
Routing Information Base
Routing
Resiliency
resilience
pubcrawl
network topology
network routing
network architecture design
computer network
named data networking
Named Data Network Security
IPv4
IP router
IP networks
IP
Internet Protocol version 4
internet
Human behavior
hijacked node
forwarding plane
data communication
computer network security
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »