Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Throughput
biblio
Performance Evaluation of DSR Protocol in MANET Untrustworthy Environment
Submitted by grigby1 on Mon, 12/28/2020 - 1:02pm
mobile ad hoc networks
untrue nodes
Throughput
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
pernicious hubs
performance evaluation
network security
network attacks
ad hoc network
mobile ad hoc network
Metrics
MANET untrustworthy environment
genuine setting
Dynamic Source Routing (DSR)
DSR protocol
DSR convention
directing convention
Compositionality
Adhoc network
ad hoc systems
biblio
LA-ANA based Architecture for Bluetooth Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
autonomic network
Wireless Personal Area Network
unicast packet delivery
stochastic model
Piconet
multiple sensor node technology
multicast packet delivery
LACAS based wireless sensor network
LACAS
LA-ANA based architecture
dynamic environment
Bluetooth environment
Bluetooth based dynamic environment
Autonomic Network Architecture (ANA)
Bluetooth
bluetooth security
multicast communication
Fault tolerant systems
fault tolerance
telecommunication congestion control
composability
wireless sensor networks
Mathematical model
Throughput
Resiliency
resilience
Human behavior
pubcrawl
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 1:28pm
IoT enabled smart home environment
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
Routing Protocol
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
mobile radio
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
RPL
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
biblio
Coupled or Uncoupled? Multi-path TCP Congestion Control for High-Speed Railway Networks
Submitted by grigby1 on Wed, 12/02/2020 - 2:00pm
Rail transportation
Wireless fidelity
uncoupled EWTCP algorithm
transport protocols
transmission performance
traffic flows categorisation
Throughput
telecommunication congestion control
Servers
Scalability
Resiliency
resilience
railway communication
congestion control algorithm
pubcrawl
Packet loss
on-board Internet services
multipath transmission control protocol congestion control
multipath TCP congestion control
multipath channels
Multi-Path TCP
Mice
high-speed railway networks
High Speed Railway
coupled congestion control
congestion window distribution
biblio
Throughput Control Method Between Different TCP Variants Based on SP-MAC Over WLAN
Submitted by grigby1 on Wed, 12/02/2020 - 1:52pm
throughput guarantee control method
Synchronization
Synchronization phenomena of Coupled oscillator
synchronization phenomena of coupled oscillators
TCP variants
TCP versions
telecommunication congestion control
Throughput
throughput control method
synchronisation
total throughput
transport protocols
Wireless communication
wireless LAN
wireless local area networks
wireless terminals
WLAN
media access control method
access protocols
carrier sense multiple access
collision avoidance
Compound TCP
Compounds
coupled congestion control
CUBIC-TCP
media access control
access point
Media Access Protocol
Oscillators
pubcrawl
resilience
Resiliency
Scalability
SP-MAC
biblio
Quality of Service (QoS) Comparison Analysis of Snort IDS and Bro IDS Application in Software Define Network (SDN) Architecture
Submitted by grigby1 on Tue, 12/01/2020 - 1:45pm
Snort
QoS measurement
quality of service
resilience
Resiliency
SDN
SDN architecture
service comparison analysis
signature based detection method
QoS
Snort IDS
software define network architecture
software defined networking
telecommunication traffic
testing
Throughput
tools
pubcrawl
packet loss parameters
Packet loss
network quality
network activity
memory usage
intrusion detection system
IDS
existing network traffic
delays
CPU usage
computer network security
composability
bro IDS application
Bro
anomaly based detection method
biblio
An Investigation of High-Throughput Biometric Systems: Results of the 2018 Department of Homeland Security Biometric Technology Rally
Submitted by grigby1 on Wed, 11/04/2020 - 1:34pm
Metrics
user satisfaction metrics
US government
unmanned face
unmanned biometric systems
U.S. Department
traveler identification
Throughput
testing
Terrorism
security of data
Science and Technology Directorate
pubcrawl
National security
metrics testing
2018 Biometric Technology Rally
Measurement
measured throughput
measured performance
MdTF
matching capability
Maryland Test Facility
Iris recognition
homeland security biometric technology rally
high-throughput security environment
high-throughput biometric systems
face-iris systems
Face
DHS S-T affiliated bio-metrics
capture capability
biblio
On the Impact of DDoS Attacks on Software-Defined Internet-of-Vehicles Control Plane
Submitted by grigby1 on Mon, 11/02/2020 - 12:09pm
resilience
wireless access points
wired networks
Throughput
Software-Defined Wireless Networks Security
Software-Defined Networking paradigm
Software-Defined Internet-of-Vehicles control plane
Software-Defined Internet-of-Vehicles
software defined networking
service management
security threats
SDN security
SDN
SD-IoV security
SD-IoV environment
Resiliency
computer architecture
pubcrawl
next generation wireless networks
Metrics
Internet of Vehicles
Internet of Things
internet
Human Factors
distributed denial of service attacks
DDoS Attacks
DDoS
controller load
control plane
computer network security
Computer crime
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
optimization
virtualized network
Virtualization
virtualisation
virtual network security tester
virtual network
virtual machines
Throughput
Switches
SRIOV technology
security of data
Scalability
pubcrawl
physical network card
performance optimization
performance evaluation
cyber security
optimisation
network security testing devices
Kernel
input-output programs
I/O throughput performance
i/o systems security
I/O requirement
i-o systems security
high-performance network
Hardware
general hardware platform
DPDK-SRIOV.
DPDK-SRIOV
data plane development kit
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »