Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Throughput
biblio
RAD: Reinforcement Authentication DYMO Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
demand protocol
Secret key
Compositionality
Encryption technique
mobility management (mobile radio)
malicious node
MANET security
authentication technique
average throughput
cryptographic operations
mobile ad hoc network
DYMO
dynamic MANET
infrastructure centralized server
MD5
Message Digest 5
RAD
reinforcement authentication DYMO protocol
Reinforcement.
Routing protocols
telecommunication security
Cryptographic Protocols
learning (artificial intelligence)
Resiliency
pubcrawl
Routing
Metrics
Reinforcement learning
authentication
encryption
message authentication
packet delivery ratio
telecommunication computing
delays
MANET
mobile ad hoc networks
Throughput
end to end delay
biblio
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
mobile ad hoc network
wormhole tunnels
wormhole attack
trust
Throughput
telecommunication security
suggested trust based routing algorithm
spoofing attack
self-assembly
Routing protocols
routing algorithm
Routing
Resiliency
pubcrawl
Performance analysis
mobile ad hoc networks
Attack vectors
Metrics
MANET security
MANET
Jitter
dynamic source routing
DSR routing protocols
Dsr
delays
Compositionality
common routing protocols
Black hole attack
AODV routing protocols
AODV
Ad-hoc On-demand Distance Vector
biblio
Behaviour Analysis and Detection of Blackhole Attacker Node under Reactive Routing Protocol in MANETs
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
Scalability
Resiliency
pubcrawl
Routing
Routing protocols
collaboration
Throughput
MANETs
Ad hoc networks
mobile computing
AODV
Blackhole attack
Blackhole
Energy
PDR
Routing Protocol
biblio
Simulation Based Study of Blackhole Attack Under AODV Protocol
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
Ad hoc networks
unauthorized node
target node
open access
Mobile adhoc Network
MANET nodes
Blackhole
AODV
AODV protocol
Blackhole attack
NS-2
mobile computing
Scalability
Throughput
mobile ad hoc networks
MANET
delays
Handheld computers
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 10:57am
Loss measurement
Packet loss rate
ns-3 network simulator
network performance parameters
mobile nodes
mobile multihop network
MANET security measurement
internal attacks
intermediate nodes
end-to-end delay
blackhole nodes
blackhole attack feature extraction
Blackhole attack
AODV
AODV protocol
external attacks
IoT
mobile ad hoc network
Throughput
mobile ad hoc networks
MANET
network security
ns-3
Routing
Routing protocols
pubcrawl
Resiliency
feature extraction
security
telecommunication security
Internet-of-Things
Scalability
biblio
Efficient Timing Channel Protection for Hybrid (Packet/Circuit-Switched) Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:29pm
Switching circuits
network transmission
network-on-chip
packet switching
packet switching NoC
packet-circuit-switched
security in NoC
Separate interface Hybrid
side-channel attacks
network routing
system security policy
TDM
Throughput
timing
timing channel
timing channel protection
timing characteristics
timing side channel
combined hybrid routers
network on chip security
Scalability
Resiliency
resilience
Metrics
channel attacks
circuit switching
circuit switching NoC
pubcrawl
conventional hybrid router
covert timing channel
hybrid network-on-chip
hybrid NoC
Integrated circuit modeling
MP-SoC
multiprocessing systems
multiprocessor system-on-chip
biblio
When Analog Meets Digital: Source-Encoded Physical-Layer Network Coding
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
Relays
wireless networks
TWRC PLNC
two-hop node coordination
Topology
Throughput
telecommunication traffic
spread spectrum communication
Source-Encoded PLNC scheme
Source-Encoded Physical-Layer Network Coding
source coding
SE-PLNC
Resiliency
Ad hoc networks
relay networks (telecommunication)
pubcrawl
Predictive Metrics
physical-level network coding
network topology
network coding
multipath relaying opportunities
multihop wireless networks
cyber physical systems
composability
channel coding
ad-hoc networks
biblio
Data Provenance for Experiment Management of Scientific Applications on GPU
Submitted by aekwall on Mon, 03/30/2020 - 11:32am
multipurpose applications
execution patterns
experiment management
gpu
GPU environments
GPU memory usage
GPU nodes
GPU runtime environments
graphics processing units
memory virtualization methods
diverse memory usage patterns
natural sciences computing
parallel architectures
pattern change
Physical Memory
resource configuration
runtime configuration
runtime execution
runtime monitoring
scientific applications
Provenance
Memory management
Runtime
Task Analysis
Resiliency
Human behavior
pubcrawl
composability
Metrics
Throughput
Monitoring
data provenance
scientific workflow
Instruction sets
application characteristics
application management
co-located applications
CUDA scientific applications
data provenance management
biblio
Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Block Cipher
Scalable Security
Weak keys
Ultra Gridsec
stream cipher algorithm
stream cipher
scalable symmetric key cryptographic scheme
peer-to-peer desktop grid framework
multithreading
grid computing security
cryptography security
block cipher encryption algorithm
Cryptography
security scheme
Instruction sets
Ciphers
security attributes
grid computing
Scalability
Throughput
performance evaluation
Peer-to-peer computing
pubcrawl
encryption
biblio
Fast and Efficient Web Caching Methods Regarding the Size and Performance Measures per Data Object
Submitted by grigby1 on Tue, 02/18/2020 - 11:54am
Scalability
optimization
optimum knapsack solutions
performance measures per data object
QoS measures
quality of service
rank exchange caching (REC)
rank exchange caching methods
resilience
Resiliency
object hit ratio
score-gated polling (SGP)
simulative evaluation
TE
Throughput
time 25.0 year
time 50.0 year
traffic engineering
Web Caching
web caching strategies
efficient Web caching methods
5G mobile communication
byte hit ratio
cache content
cache storage
Correlation
CPU caches
data chunk storage
Database systems
delays
pubcrawl
generalized value hit ratio
Greedy-Dual
hit ratio optimization and bounds
independent request model
internet
LFU
LRU
metadata
Metrics
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »