Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security threats
biblio
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:02am
NS-2 simulation
wireless ad hoc networks
Wireless ad hoc network
Vectors
trust value
Trust management
telecommunication traffic
security threats
security
Routing protocols
Routing
reactive routing protocol
partial received packets
packet dropping attacks
Packet dropping
Ad hoc networks
network traffic
mobile ad hoc networks
malicious packet dropping
malicious node
low false positive probability
dynamic trust model
DoS attack
denial of service attack
Conferences
Computers
computer network security
Black hole attack
AODV
biblio
Secure fault tolerance mechanism of wireless Ad-Hoc networks with mobile agents
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
related works
wireless self-organization networks
wireless ad hoc networks
unauthorized attempts
telecommunication security
telecommunication network reliability
signal processing
security threats
security reliability
security precautions
secure mobile agent
secure fault tolerance
secure communication
Ad hoc networks
mobile nodes
mobile agents
mobile agent migration
mobile agent
mobile ad hoc networks
Fault tolerant systems
fault tolerance
fault masking
Erbium
dynamic self-organization networks
Conferences
Ad-Hoc Network
biblio
Staffing for Security: Don't Optimize
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
botnets
computer security
Data Security
Economics
IT security employees
Organizations
Personnel
privacy
security
security of data
security threats
software development
staff allocation optimization
staffing
biblio
OpenSSL HeartBleed: Security Management of Implements of Basic Protocols
Submitted by BrandonB on Tue, 05/05/2015 - 10:14am
information security management
software facilities
Software
security threats
secure socket layer
Protocols
OpenSSL security
OpenSSL HeartBleed
information technology
Computers
information security
hierarchical structure
Heart beat
hardware facilities
Hardware
Cryptographic Protocols
cross-layer security management
biblio
On Security-Effective and Global Mobility Management for FPMIPv6 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:49pm
handover latency
security-effective mobility management
security threats
Security analysis
public key cryptography
Protocols
packet loss reduction
network node
mobility management (mobile radio)
mobile node authentication
Manganese
Kang-Park-ESS-FH scheme
Internet Engineering Task Force
IETF
AAA
Handover
global mobility management
FPMIPv6 networks
FPMIPv6
fast handover-proxy mobile IPv6
ESS-FP
enhanced security scheme
Cryptographic Protocols
CGA method
CGA
authentication-authorization-accounting infrastructure
authentication
biblio
Implementing IPsec in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:26pm
IEEE 802.15.4 networks
Zigbee
WSNs
wireless sensor networks
stand-alone wireless sensor networks
security threats
Payloads
IPv6 enabled sensor networks
IPsec authentication header
IP networks
Internet of Things paradigm
internet
6LoWPAN adaptation layer
IEEE 802.15 Standards
ESP compressed header performance
end-to-end communication path
encryption
encapsulation security payload
E2E security
Cryptography
computer network security
communication endpoints
authentication
AH
« first
‹ previous
1
2
3
4
5
6
7
8
9