Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Throughput
biblio
Mitigation Technique for Black hole Attack in Mobile Ad hoc Network
Submitted by aekwall on Tue, 03/09/2021 - 12:36pm
mobile ad hoc networks
Random Mobility
network scenario
Gray hole attack
device communication
Black hole attacks
Black hole attack
mitigation technique
mobile ad hoc network
Throughput
Scalability
quality of service
delays
Routing protocols
Wireless communication
Routing
pubcrawl
Resiliency
telecommunication security
biblio
Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)
Submitted by aekwall on Tue, 03/09/2021 - 12:36pm
Packet loss
ns2
normal network conditions
largest remaining energy
flooding attack AODV routing protocol
Flooding Attack
energy-efficient AODV
energy parameters
different network conditions
Black hole attacks
Vehicular Ad-hoc Network
Performance analysis
wireless technology
Black hole attack
Energy
AODV
Scalability
data communication
Blackhole attack
Throughput
VANET
quality of service
delays
Energy Efficiency
Wireless communication
vehicular ad hoc networks
malicious nodes
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
Detection of Blackhole Attack in Wireless Sensor Network Using Enhanced Check Agent
Submitted by aekwall on Mon, 03/01/2021 - 4:45pm
Scalability
zigbee 802.15.4
Zigbee
wireless sensor networks
sensor security
Wireless Sensor Network
Wireless Mesh Network Security
Wireless communication
Throughput
security
Black hole attack
Routing
Resiliency
quality of service
pubcrawl
network security
Metrics
Internet of Things
composability
Blackhole attack
biblio
High-Performance and Range-Supported Packet Classification Algorithm for Network Security Systems in SDN
Submitted by grigby1 on Tue, 02/23/2021 - 2:38pm
packet header bits
512-bit OpenFlow rule
Bit Vector-based packet classification methods
content-addressable storage
high clock frequency
key function
multidimensional fields
multifield matching
network security systems
Clocks
packet switching
range fields
range matching
Range Supported Bit Vector algorithm
Range-Supported packet classification algorithm
RSBV
rule sets
two-dimensional modular architecture
Communication networks
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Throughput
internet
security
composability
telecommunication network routing
encoding
pattern classification
SDN
software defined networking
pipeline processing
network coding
biblio
Malicious user identification scheme for network coding enabled small cell environment
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
telecommunication network reliability
Small Cells
small cell technology
reliable communication
Pollution
next generation communication technologies
network coding environment
malicious user identification scheme
fifth generation of communication networks
device to device communication
dense network coding
next generation networks
Microprocessors
5G
network coding
cooperative communication
computer architecture
Communication networks
wireless network
Protocols
composability
cellular radio
5G mobile communication
telecommunication security
Throughput
Resiliency
resilience
Metrics
pubcrawl
Peer-to-peer computing
security
biblio
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
resource management
dynamic networks
Q-learning solution
network slicing
network slice requests
network optimization
frequency-time blocks
dynamic resource optimization
Dynamic Resource Allocation
computational constraints
5G security
5G radio access network slicing
Bit error rate
Reinforcement learning
learning (artificial intelligence)
Radio Access Network
Dynamic scheduling
resource allocation
telecommunication computing
composability
radio access networks
5G mobile communication
optimization
Throughput
Resiliency
resilience
Metrics
pubcrawl
biblio
Highly Area-Efficient Implementation of Modular Multiplication for Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
koblitz Curve
Virtex-7 FPGA technology
Throughput
Table lookup
Scalability
Resiliency
Registers
public-key cryptosystem
Public Key Cryptography (PKC)
public key cryptography
pubcrawl
multiplying circuits
Metrics
LUT-FF pairs
logic design
256-bit modified interleaved modular multiplication
Interleaved Modular Multiplication (IMM)
IMM
hardware implementation design
Hardware Architecture (HA)
Hardware
flip-flops
field programmable gate arrays
Field Programmable Gate Array (FPGA)
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC operation
Cryptography
cryptographic operation
computer architecture
biblio
Covert Communication by Exploiting Node Multiplicity and Channel Variations
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
error statistics
wireless broadcast networks
superposition coding
Propagation losses
private message
pre-shared secret
noncovert users
noncovert message
node multiplicity
low probability of detection (LPD)
detection probability
detection error probability
channel variation
covert channels
Information hiding
covert communication
pubcrawl
error probability
covert message
broadcast channels
Transmitters
uncertainty
wireless channels
Compositionality
Receivers
radio networks
Wireless communication
Scalability
telecommunication security
Throughput
Resiliency
resilience
biblio
Random Number Generator Based on Skew-tent Map and Chaotic Sampling
Submitted by aekwall on Mon, 01/18/2021 - 11:22am
Oscillators
skew-tent map
field programmable analog arrays
field programmable analog array
discrete-time chaos
chaotic sampling of regular waveform
random number generator
Clocks
Trajectory
Scalability
chaotic cryptography
chaotic communication
Throughput
Generators
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Additive and Subtractive Cuckoo Filters
Submitted by aekwall on Mon, 01/11/2021 - 1:32pm
ASCF
data deletion
subtractive cuckoo filter
subtraction operations
space-efficient data structures
space inflation
space efficiency
space cost
set membership queries
high-speed lookups
exclusive-OR operation
cuckoo hashing
cuckoo filters
bucket indexes
Bloom filters
Scalability
additive cuckoo filter
addition operations
Table lookup
Additives
Throughput
Fingerprint recognition
quality of service
Indexes
privacy
data structures
query processing
standards
pubcrawl
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »