Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
peer-to-peer networks
biblio
An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:14am
BitTorrent
peer to peer security
resource management
peer-to-peer networks
P2P protocol
network infrastructure
Leecher-to-Leecher transactions
incentive-based security model
incentive security model
incentive methods
Gnutella
fairness
computer network security
Network
Human Factors
Scalability
Metrics
Peer-to-peer computing
Protocols
pubcrawl
Resiliency
computer network management
security
Cryptography
biblio
Proof of Work Without All the Work
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
peer to peer security
bitcoin
Byzantine Consensus
Committee Election
composability
Metrics
peer-to-peer networks
Proof of Work
pubcrawl
Sybil attack
sybil attacks
biblio
Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
smart grid advanced metering infrastructure
power data
pubcrawl
public key cryptography
public key infrastructure
public-keys
resilience
Resiliency
Servers
Smart Grid
peer-to-peer networks
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
telecommunication network management
telecommunication security
trees (mathematics)
wireless mesh networks
wireless multihop networks
Human behavior
Advanced Metering Infrastructure AMI
AMI networks
certificate revocation list
certification
Communication Network
Compositionality
distributed CRL management model
distributed hash table
distributed hash trees
advanced metering infrastructure
Human Factors
IEEE 802.11s mesh standard
key management
Logic gates
Measurement
metering
Meters
P2P networks
Peer-to-peer computing
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
A Framework for Cognitive Recommender Systems in the Internet of Things (IoT)
Submitted by grigby1 on Thu, 05/24/2018 - 11:10am
Internet of Things(IoT)
Servers
sensors
Scalability
Resiliency
resilience
recommender systems
pubcrawl
peer-to-peer networks
Peer-to-peer computing
IoT
cognitive radio
Internet of Things
information technology
Human Factors
Human behavior
Engines
cognitive systems
cognitive system
cognitive recommender systems
cognitive radio networks
biblio
Access Control for Secure Distributed Data Structures in Distributed Hash Tables
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Resiliency
middleware
middle-ware scheme
P2P networks
P2P overlays
Peer-to-peer computing
peer-to-peer networks
pubcrawl
resilience
Metrics
reusable security architecture
secure distributed data structures
Secure File Sharing
security issues
social networking (online)
social networks
social projects
trusted third parties
data structures
authorisation
centralized servers
client-server model
client-server systems
communication protocols
composability
computer network security
Context
Access Control
DDS
DHT
Distributed databases
distributed data storage services
distributed hash tables
encryption
file sharing
Human behavior
biblio
A Reliability-Based Trust Model for Efficient Collaborative Routing in Wireless Networks
Submitted by K_Hooper on Fri, 10/13/2017 - 9:23am
Collaborative routing
Computer Theory and Trust
Computing Theory
Human behavior
peer-to-peer networks
peers' attributes
pubcrawl
Routing performance
trust
Trust and reputation management
biblio
A Reliability-Based Trust Model for Efficient Collaborative Routing in Wireless Networks
Submitted by grigby1 on Fri, 08/18/2017 - 12:49pm
Collaborative routing
composability
peer-to-peer networks
peers' attributes
pubcrawl
Resiliency
Routing performance
Scalability
Trust and reputation management
Trust Routing
biblio
Secure distributed data structures for peer-to-peer-based social networks
Submitted by BrandonB on Thu, 04/30/2015 - 1:22pm
online social network
trees (mathematics)
social networking (online)
Social network services
social enterprise network
secure distributed data structure
Public key
prefix trees
peer-to-peer technology
peer-to-peer networks
Peer-to-peer computing
Access Control
network security
global scale
file organisation
Distributed social networks
distributed list data structure
distributed hash table
distributed data management
data structures
authorisation