Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireless Sensor Network
biblio
Preserve Location Privacy for Cyber-Physical Systems with Addresses Hashing at Data Link Layer
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
Wireless communication
Location Privacy in Wireless Networks
stronger privacy protection
power efficiency
media access control
data link layer frame
cyber-physical system
Compositionality
Payloads
wireless medium
sensors
Metrics
Cryptography
Routing
privacy
location privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
cyber-physical systems
telecommunication security
Receivers
biblio
A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
security architecture
Location Privacy in Wireless Networks
source location protection
Smart IoT
protecting source-location privacy scheme
Privacy Protections
multi-sinks
critical problems
CPSLP scheme
attack modes
source location privacy
cloud-based
Position measurement
daily activities
Transforms
Compositionality
Cloud Computing
probability
telecommunication network routing
Metrics
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
security
telecommunication security
data privacy
biblio
Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
telecommunication network routing
Location Privacy in Wireless Networks
tactically positioned agent nodes
source location privacy
random routing techniques
random routing
Phantoms
agent node routing
agent node
adversary
Position measurement
source node
WSN
Compositionality
Safety
Metrics
sensor placement
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
Monitoring
biblio
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
CPS infrastructure
middleware
sensors
Human Factors
Data Analytics
mobile devices
CPS
Wireless Sensor Network
WSN
cyber physical systems
communication infrastructure
computerized integration connectivity
cyber world
CPS middleware
Cyber Physical system architecture
energy efficient protocols
Machine Communication
man-made physical world
Mobile Sensor Information Agent
MSIA
quality of services
SDN-based CPS
software related mobile sensing paradigm
CPS Privacy
wireless sensor networks
Monitoring
Cloud Computing
Internet of Things
security
Protocols
Software
mobile computing
computer architecture
software defined networking
Human behavior
pubcrawl
computer network security
energy conservation
telecommunication power management
Decision Making
privacy
software-defined networking
mobile radio
cyber-physical systems
SDN
smart decision making
quality of service
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
biblio
Intrusion Detection and Security System for Blackhole Attack
Submitted by grigby1 on Mon, 06/01/2020 - 3:57pm
Blackhole attack
IDS
intrusion detection system
network simulator
pubcrawl
resilience
Resiliency
Scalability
security issues
security of data
security system
telecommunication security
Wireless Sensor Network
wireless sensor networks
biblio
Machine Learning Based Novel Approach for Intrusion Detection and Prevention System: A Tool Based Verification
Submitted by aekwall on Mon, 05/11/2020 - 11:13am
authentication
unique features
proactive intrusion prevention
prevention system
power supply
multiple techniques
minimum bandwidth
limited energy
HLPSL.
AVISPA tool
AVISPA
industrial environments
WSN
intrusion prevention
formal verification
military applications
Intrusion Detection
tools
network intrusion detection
Metrics
wireless sensor networks
Wireless Sensor Network
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Protocols
Cryptographic Protocols
Servers
computer network security
biblio
Secure and Composite Routing Strategy through Clustering In WSN
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
composability
data trust
Malicious Detection Rate
network lifetime
pubcrawl
Scalability
Social trust
trust model
Trust Routing
Wireless Sensor Network
biblio
Balanced Load Clustering with Trusted Multipath Relay Routing Protocol for Wireless Sensor Network
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
quality of service
WSN
wireless sensor networks
Wireless Sensor Network
wireless channels
trusted multipath relay routing
trust values
Trust Routing
telecommunication security
Scalability
Routing protocols
relay node
relay networks (telecommunication)
balanced load clustering
pubcrawl
pattern clustering
network simulation software
multipath trust
multipath channels
malicious activity trusted multipath relay routing protocol
Hybrid medium access control (HMAC)
Energy Efficiency
energy consumption
composability
balanced load clustering concepts
biblio
Model for Study of Malware Propagation Dynamics in Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 2:35pm
Wireless Sensor Network
Susceptible-Exposed-Infectious-Recovered-Dead model
Propagation
neighboring sensor nodes
malware status
malware spread
malware propagation dynamics
malicious signals presence
Grippers
Equilibrium points
epidemiology basic reproduction number
Epidemic model
early detection method
critical security challenges
computer viruses
WSN
telecommunication security
security mechanism
Stability analysis
sensor security
detection
Analytical models
Metrics
Computational modeling
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
invasive software
malware
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »