Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
WSN
biblio
NL-IDS: Trust Based Intrusion Detection System for Network Layer in Wireless Sensor Networks
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
security issues
protocol layers
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
secure path
policy-based governance
security system
sensor node trust
telecommunication security
trust
trust based intrusion detection system
Wireless Sensor Network
wireless sensor networks
WSN
Mathematical model
Black hole attackers
Blackhole attack
collaboration
composability
Conferences
false trust
Intrusion Detection
intrusion detection system
Black hole attack
Measurement
Metrics
mobile ad hoc networks
network intrusion detection
network layer
NL-IDS
periodic trust value
biblio
An Improved Asymmetric Key Based Security Architecture for WSN
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Metrics
WSN
wireless sensor networks
wireless sensor networking
Wireless communication
ubiquitous healthcare system
security of data
Resiliency
resilience
public key cryptography
Pseudo inverse matrix.
PKC
PEKS-PM
password
pubcrawl
Human behavior
encryption
data transfers
Cryptography
computer architecture
Compositionality
composability
authentication
asymmetric key based security architecture
Asymmetric Encryption
asymmetric based scheme
AKA
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
smart toasters
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grid Sensors
smart grid stations
Smart Grids
pubcrawl
smartphone
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
Human behavior
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
attacks
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
biblio
Asymptotic Analysis of a New Low Complexity Encryption Approach for the Internet of Things, Smart Cities and Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
sensors
party fusion center perspectives
probability
pubcrawl
quantisation (signal)
quantizer
resilience
Resiliency
scalar parameters
secure estimation
sensor networks
sensor outputs
parameter estimation
smart cities
Smart Grid
Smart Grid Sensors
stochastic encryption
telecommunication security
TPFC estimation
vector parameter estimation
wireless medium
wireless sensor networks
WSN
Internet of Things
binary stochastic encryption approach
Compositionality
Cryptography
encrypted nonbinary quantized data
encryption
encryption approaches
fixed threshold binary quantization limits parameter estimation
Human behavior
Human Factors
information security
asymptotic analysis
legitimate fusion center
LFC estimation
low complexity encryption
low complexity encryption approach
maximum likelihood estimation
maximum-likelihood estimation
mean square error methods
nonbinary generalized case
nonbinary quantized observations
optimal estimators
biblio
Research on the Node Information Security of WSN Based on Multi-Party Data Fusion Algorithm
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
Routing
WSN
wireless sensor networks
Wireless Sensor Network
Wireless communication
urban power industry
telecommunication security
telecommunication network topology
telecommunication network reliability
smart power grids
smart power grid
Smart Grids
Smart Grid Sensors
sensor fusion
routing security
Routing protocols
Big Data
Resiliency
resilience
pubcrawl
power system security
power system reliability
plane routing protocol
node information security
network topology
multiparty data fusion algorithm
Human Factors
Human behavior
data fusion technology
Compositionality
clustering routing protocol
cluster routing protocol
biblio
Review of jamming attack using game theory
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
malicious attack nodes
WSN
wireless sensor networks
Wireless Sensor Network
wireless networks
timing channel
telecommunication security
security threats
security
Scalability
pubcrawl
power expenditure
network load
Metrics
external attack
jamming technique
jamming detection
jamming attack
Jamming
internal attack
interaction model
information preservation
Human Factors
Games
game theory
game theoretic strategies
game theoretic security
game theoretic representation
biblio
Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
mobile ad hoc networks
WSN
wireless sensor networks
virtual node
telecommunication security
selective flooding technique
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Optimized Link State Routing protocol
OLSR protocol
OLSR
network layer attacks
attack prevention
Metrics
MANET routing protocol
MANET
formal routing
Fictitious Node Mechanism
Elliptic curve cryptography
ECC algorithm
DoS attacks
DoS
denial of service attack
Denial Contradictions
DCFM
Compositionality
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
biblio
Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
Algorithm design and analysis
Approximation algorithms
Approximation methods
Computers
Conferences
NP-completeness
optimisation
polynomial approximation
polynomial-time approximation schemes
polynomials
Robot sensing systems
time-constrained data harvesting
wireless sensor networks
WSN
1536086
biblio
Formal Modeling and Verification of a Wireless Body Area Network (WBAN) Protocol: S-TDMA Protocol
Submitted by grigby1 on Wed, 05/09/2018 - 2:47pm
time division multiple access
resilience
Resiliency
S-TDMA protocol
Scalability
scalable verification
TDMA
TDMA bus arbitration
temporal aspect modeling
real-time model checker
timed automata
WBAN
Wearable devices
wireless body area network protocol
Wireless communication
wireless sensor networks
WSN
access protocols
pubcrawl
model checking
Metrics
Medium Access Control
Media Access Protocol
MAC protocols
MAC protocol
information processing systems
implanted devices
formal verification
formal validation
Connectors
Compositionality
body sensor networks
body area networks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »