Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile radio
biblio
Secure Route Selection Mechanism in the Presence of Black Hole Attack with AOMDV Routing Algorithm
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
Blackhole attack
trusted network
terminal node
single attack
sensitive field
secure route selection mechanism
police rescue operation
origin node
collaborative attack
Black hole attack
AOMDV routing algorithm
AOMDV
adversarial network setting
security mechanism
IP networks
mobile ad hoc networks
MANET
collaboration
mobile radio
Reliability
Routing
Routing protocols
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
Submitted by aekwall on Tue, 05/26/2020 - 10:57am
Mobile ad hoc networks (MANETs)
ad hoc nature
AODV protocol
battery power
central authority
dynamic topologies
IEEE 802.11ac protocol
industrial fields
memory space
Blackhole attack
mobile ad-hoc networks
mobility model
multiple Blackhole attack
NS-3 simulator
NS-3.27 simulator
OLSRprotocol
physical protection
single Blackhole attack
network nodes
telecommunication security
network security
Resiliency
pubcrawl
Routing protocols
Routing
mobile radio
delays
Scalability
Relays
wireless LAN
MANET
mobile ad hoc networks
telecommunication network topology
Ad hoc networks
mobile computing
fixed infrastructure
biblio
An Access Authentication Algorithm Based on a Hierarchical Identity-Based Signature over Lattice for the Space-Ground Integrated Network
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
SGIN
lattice based mobile access authentication mechanism
lattice-based cryptography
Lattices
mobile access authentication protocol
mobile radio
mobile users
multi-access systems
private key cryptography
Protocols
L-HIBS scheme
shared session key exchange
SIS problem
small integer solution
space communication links
space-ground integrated network
standard security model
telecommunication security
theoretical cryptography
Compositionality
pubcrawl
access authentication
access authentication algorithm
adaptive selection messages
authentication
authentication delay
bidirectional authentication
composability
signature based defense
computer architecture
Cryptographic Protocols
Cryptography
digital signatures
Generators
hierarchical access authentication architecture
hierarchical identity-based cryptography
hierarchical identity-based signature
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist
biblio
A Trusted Routing Mechanism for Mobile Social Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
path trust level
trusted path
trusted DSR routing mechanism
Trust Routing
trust level
TDR protocol
social networking (online)
Scalability
Routing protocols
Routing Protocol
route cost
pubcrawl
composability
packet delivery fraction
network topology
network performance
network communication
MSN
mobile social networks
mobile social network
mobile radio
mobile computing
DSR routing protocol
computer network security
biblio
A Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal
Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
Scalability
Mobile Ad-hoc Network host
mobile radio
packet count
privacy
Protocols
pubcrawl
Resiliency
route detection
route discovery
Routing
Routing protocols
Mobile Ad-Hoc Network (MANET)
Secure Autonomic Mobile Ad-hoc Network
telecommunication network routing
trust administration approach
Trust estimation dependent
trust management approach
trust organization approaches
Trust Routing
trusted path
trusted Routing proposal
wireless sensor networks
Informatics
Adaptive Information Dissemination (AID)
attacker
composability
Compositionality
data privacy
Data Transmission
different occurrences ease
direction-finding procedure
fuzzy trust approach
hybrid approach
inaccessible systems
Adaptive Information Dissemination
information dissemination
internet
Internet of Things
Internet of Things (IoT)
Internet of Things gadgets
IoT
MANET Attack Detection
manet privacy
Metrics
mobile ad hoc networks
biblio
QoE-Driven Anomaly Detection in Self-Organizing Mobile Networks Using Machine Learning
Submitted by grigby1 on Mon, 02/17/2020 - 5:14pm
ns-3
user-centric approach
telecommunication computing
system model
SON
self-organizing mobile networks
self-healing networks
Resiliency
resilience
quality of experience
QoE-driven anomaly detection
qoe
pubcrawl
Predictive models
parametric QoE model
ns-3 network simulator
Anomaly Detection
network-centric approaches
network scenario
mobile radio
mobile computing
machine learning
learning (artificial intelligence)
green mobile communication networks
end-user experience
dysfunctional serving nodes
dysfunctional serving eNodeBs
Decision trees
Data models
Computational modeling
composability
biblio
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Submitted by grigby1 on Mon, 02/10/2020 - 11:30am
secure socket layer
mobile radio
multiattribute associated fingerprints
multiple-attribute-based encrypted traffic classification
network management
pattern classification
Protocols
pubcrawl
resilience
Resiliency
Scalability
mobile network applications
security of data
Servers
SSL Trust Models
SSL/TLS
telecommunication security
telecommunication traffic
Training
Transport Layer Security
video streaming
encrypted protocol detection
application runtime
application-level traffic classification
attribute-lacking problem
certificate
classification guidance information
communication security
Correlation
Cryptographic Protocols
Cryptography
domain name
application data
Encrypted traffic classification
encrypted traffic classification methods
encrypted video stream classification
handshake certificates
Human behavior
Human Factors
MAAF
Markov processes
Metrics
biblio
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
financial markets theory
wireless sensor networks
Trusted Computing
trust diversification
Trajectory
telecommunication computing
spatially autocorrelated candidate sensors
sensors
sensor data accuracy trustworthiness
pubcrawl
Portfolios
online data cleaning
online context-aware data cleaning method
MWSN
Mobile wireless sensor networks
mobile radio
Control Theory
DTP
diversified trust portfolio
Decision Making
data imprecision
data handling
Correlation
context-aware
Conferences
Computing Theory and Trust
Compositionality
composability
cleaning
beta-trust
security
biblio
RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless channels
Transmitters
telecommunication security
Signal to noise ratio
RSS-based localization method
RSS-based localization
Resiliency
resilience
Receivers
radiofrequency interference
radio spectrum management
PUE attacker detection
cognitive radio
primary user signals
primary user emulation attacker
primary user emulation attack
mobile users
mobile radio
maximum likelihood estimation
Mathematical model
licensed users
emulation
cognitive radio technology
Cognitive Radio Security
cognitive radio networks
« first
‹ previous
1
2
3
4
5
next ›
last »