Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
WSN
biblio
Detection of Falsified Selfish Node with Optimized Trust Computation Model In Chimp -AODV Based WSN
Submitted by grigby1 on Fri, 07/21/2023 - 2:14pm
resilience
TCM
COA-EASRP
COA
false trust
energy measurement
Resiliency
AODV
Routing protocols
WSN
Adaptation models
Routing
wireless sensor networks
Computational modeling
Scalability
collaboration
policy-based governance
pubcrawl
security
biblio
Research on Electromagnetic Energy Harvesting Technology for Smart Grid Application
Submitted by grigby1 on Fri, 01/20/2023 - 12:31pm
WSN
Magnetic energy
Magnetic cores
Electromagnetic energy harvesting
Density measurement
Power system measurements
Voltage
Smart Grid Sensors
energy harvesting
pubcrawl
Smart Grid
Compositionality
Smart Grids
Software
Resiliency
resilience
Human Factors
biblio
A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network
Submitted by grigby1 on Tue, 12/06/2022 - 2:51pm
6LoWPAN
Resiliency
resilience
composability
pubcrawl
hospitals
Industries
internetworking
IoT
LLNs
network topology
Routing
Routing protocols
RPL
Software algorithms
WSN
biblio
Security Architecture Development in Internet of Things Operating Systems
Submitted by grigby1 on Tue, 12/06/2022 - 2:50pm
6LoWPAN
Resiliency
resilience
composability
pubcrawl
Contiki
IoT
Memory management
network security
operating systems
privacy
Protocols
Systems engineering and theory
wireless sensor networks
WSN
biblio
Enhancing Source-Location Privacy in IoT Wireless Sensor Networks Routing
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
Routing
Source Location Privavy
Costs
Location Privacy in Wireless Networks
location privacy
WSN
evaluation
wireless networks
energy consumption
Compositionality
component
encryption
composability
Wireless communication
wireless sensor networks
Protocols
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Energy Efficient Security Solution for Attacks on Wireless Sensor Networks
Submitted by grigby1 on Tue, 04/19/2022 - 10:39am
pubcrawl
WSN
wireless sensor networks
Wireless communication
Sensor Systems
sensor security
security
Scalability
resilience
attacks
Protocols
Market research
IoT
Forestry
Energy Efficiency
encryption
cyber physical systems
biblio
A Novel Authentication Mechanism for Securing Underwater Wireless Sensors from Sybil Attack
Submitted by grigby1 on Wed, 03/23/2022 - 11:35am
WSN
UWSN
Underwater Sensor Network
SN
PER
ECR
fuzzy system
underwater communication
sybil attacks
PDR
Fuzzy logic
security
Metrics
energy resources
Routing
composability
Wireless communication
wireless sensor networks
authentication
Resiliency
resilience
pubcrawl
biblio
Intrusion Detection System Using Optimal Support Vector Machine for Wireless Sensor Networks
Submitted by grigby1 on Tue, 03/01/2022 - 4:16pm
Metrics
WSN
wireless sensor networks
Transforms
SVM
resilience
pubcrawl
optimization
network intrusion detection
Support vector machines
machine learning
kernel selection
Kernel
Intrusion Detection
Benchmark testing
Predictive Metrics
Resiliency
composability
biblio
A Survey on Intrusion Detection System in Ad Hoc Networks Based on Machine Learning
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Industries
MANET Attack Detection
Traffic
Network
intrusion
detection
ANN
telecommunication traffic
WSN
MANET
Compositionality
Logic gates
Resiliency
Metrics
pubcrawl
Wireless communication
SDN
machine learning
Intrusion Detection
wireless sensor networks
Monitoring
biblio
A Graph-based Approach to Detect DoB Attack
Submitted by aekwall on Mon, 01/10/2022 - 12:49pm
security
wireless sensor networks
quality of service
Anomaly Detection
surveillance
Conferences
pubcrawl
Resiliency
composability
WSN
Predictive Metrics
pervasive computing
DoB
dynamic graph
attack graphs
1
2
3
4
5
6
7
next ›
last »