Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
WSNs
biblio
Implementation and Performance Analysis of Lightweight Block Ciphers for IoT applications using the Contiki Operating system
Submitted by aekwall on Fri, 03/03/2023 - 9:59am
light emitting diodes
lightweight block ciphers
cooja
Contiki
Lightweight Ciphers
lightweight cryptography
Random access memory
cyber-physical systems
Sensor Systems
sensors
Telecommunications
Resiliency
Scalability
pubcrawl
operating systems
WSNs
wireless sensor networks
biblio
Malicious Nodes Detection Scheme Based On Dynamic Trust Clouds for Wireless Sensor Networks
Submitted by grigby1 on Fri, 08/12/2022 - 1:25pm
uncertainty
trust model
Computers and information processing
cloud theory
trust evaluation
Computing Theory
trust
WSNs
simulation
Cloud Computing
composability
wireless sensor networks
Computational modeling
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
MSCLP: Multi-Sinks Cluster-Based Location Privacy Protection scheme in WSNs for IoT
Submitted by grigby1 on Tue, 08/17/2021 - 3:31pm
Microelectronics
WSNs
wireless sensor networks
wireless networks
source location privacy
Routing
Resiliency
resilience
pubcrawl
privacy
Multi sinks
Compositionality
Metrics
Measurement
Location Privacy in Wireless Networks
location privacy
Human behavior
energy consumption
Dynamic Routing
delays
delay
biblio
Trust and Packet Loss Aware Routing (TPLAR) for Intrusion Detection in WSNs
Submitted by aekwall on Mon, 06/28/2021 - 11:32am
computational intelligence
false trust
residual energy
MDR
FPR
Buffer Capacity
WSNs
Packet loss
Energy states
Intrusion Detection
Computational modeling
Routing
wireless sensor networks
policy-based governance
pubcrawl
Resiliency
Scalability
biblio
Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 10:55am
Metrics
Location Privacy in Wireless Networks
source-location privacy
dynamic mix-ring
Position measurement
Wireless communications
WSNs
routing algorithm
Compositionality
Heuristic algorithms
statistical analysis
Monitoring
Routing
privacy
wireless sensor networks
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
biblio
A highly accurate machine learning approach for developing wireless sensor network middleware
Submitted by aekwall on Mon, 06/01/2020 - 9:47am
middleware security
WSNs
WSN
wireless sensor networks
wireless sensor network middleware
visualization
unsupervised learning technique
Unsupervised Learning
sensors
security problems
security of data
security
Resiliency
resilience
pubcrawl
policy-based governance
composability
middleware
malicious attacks
machine learning
learning (artificial intelligence)
intelligent middleware
Generators
generator
Generative Adversarial Networks algorithm
GANs
gan
Gallium nitride
fake data
detector
Data Transmission
confusion matrix
biblio
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/01/2019 - 10:30am
security
lightweight monitoring system
malicious data-integrity attacks
malicious nodes
Metrics
Monitoring
network attacks
networked system
pubcrawl
resilience
Resiliency
IoT security
security of data
sensor correlations
Silicon
telecommunication security
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
WSNs
ECA rule-based wireless sensor networks
abnormal-node detection
abnormality thresholds
Correlation
data integrity
data integrity attack
data-integrity detection
dependability
dependable monitoring system
distributed system
abnormal nodes
ECA rules
embedded sensor devices
event-condition-action rule
failure handling
Fuzzy logic
heterogeneous sensor readings
hierarchical abnormal-node detection
hierarchical framework
Internet of Things
biblio
A Low Power Cybersecurity Mechanism for WSNs in a Smart Grid Environment
Submitted by grigby1 on Mon, 11/19/2018 - 11:31am
smart grid environment
phasor measurement
Phasor measurement units
power consumption
power system security
pubcrawl
Receivers
resilience
Resiliency
security of data
sensor devices
smart grid cybersecurity
North American Electric Reliability Corporation
smart grid monitoring application
Smart Grid Sensors
Smart Grids
smart power grids
Substations
Throughput
wireless sensor networks
WSN cybersecurity mechanism
WSN security mechanisms
WSNs
Denial-of-Sleep Attack
CIP-002 standards
CIP-009 standards
communication functionalities
Compositionality
computer security
critical infrastructure protection standards
critical power grid infrastructure
Cybersecurity
cybersecurity requirements
delay
CIP
Distributed Sensing
Human behavior
Human Factors
low power consumption
low power cybersecurity mechanism
MAC layer
Monitoring
NERC
NERC CIP requirements
NERC CIP standards
biblio
Joint delay and energy minimization for Wireless Sensor Networks using instantly decodable network coding
Submitted by grigby1 on Mon, 06/11/2018 - 2:34pm
IDNC completion time
WSNs
wireless sensor networks
telecommunication power management
stable clustered network structure
sensors
sensor nodes
Resiliency
resilience
pubcrawl
partition form
network coding
Metrics
instantly decodable network coding
IDNC delay
Coalitional game theory
IDNC
Games
game theory
energy minimization
energy consumption
effective distributed schemes
distributed merge-and-split algorithm
delays
Decoding
cooperative game theory
cooperative data exchange scheme
Cooperative data exchange
cooperative communication
composability
biblio
Security of hardware architecture, design and performance of low drop-out voltage regulator LDO to protect power mobile applications
Submitted by grigby1 on Wed, 02/21/2018 - 12:43pm
CMOS low-power
Hardware
integrated circuit
LDO
Low power SOC
Mathematical model
Network Security Architecture
Power transistors
pubcrawl
Regulators
resilience
Resiliency
security
Voltage control
wireless sensor networks
WSNs
1
2
next ›
last »