Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless mesh networks
biblio
Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast Protocols
Submitted by BrandonB on Fri, 05/01/2015 - 9:49am
optimization
WMN
wireless mesh networks
wireless links
Wireless communication
simple graph models
search problems
Routing protocols
Protocols
Probabilistic logic
probabilistic edge weights
probabilistic breadth-first search
path lengths
Approximation methods
NWB protocols
NWB optimizations
NWB dissemination
network-wide broadcasts
network-wide broadcast protocols
Monte Carlo methods
Monte Carlo method
Mathematical model
link qualities
graph theory
Complexity theory
complex propagation characteristics
biblio
Signal fingerprinting in cognitive wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
malicious attacks
wireless mesh networks
Wireless communication
wireless
telecommunication signalling
telecommunication security
spread spectrum communication
Signal to noise ratio
signal fingerprinting
security
RFF
public key cryptography
Public key
Protocols
active radiofrequency fingerprinting
Fingerprinting
DoS
denial-of-service attacks
Demodulation
Cryptographic Protocols
CRM
common-control-channel information
cognitive wireless networks
cognitive radio manager framework
cognitive radio
Cognitive
Amplitude shift keying
biblio
Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
probe selection algorithm
WMN
wireless multihop networks
wireless mesh networks
Wireless communication
testing
testbed experimentation
Telecommunication standards
spread spectrum communication
security of data
security
Probes
active-probing-based network intrusion detection system
Intrusion Detection
indoor wireless mesh testbed
indoor communication
IEEE 802.11s
Equations
Bayesian model
Bayesian inference
Bayes methods
Bayes inference
AP-NIDS DogoIDS
biblio
A denial of service attack in advanced metering infrastructure network
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
puppet attack
wireless mesh networks
smart power grids
smart power grid
smart meters
smart meter
security of data
Routing protocols
radiotelemetry
advanced metering infrastructure network
power system measurement
power engineering computing
MESH network
Floods
electricity
DoS attack
denial of service attack
Computer crime
biblio
Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
Submitted by BrandonB on Fri, 05/01/2015 - 9:47am
Smart Grids
network performance
network resiliency improvement
plant-generation local area networks
Protocols
SAE
security attacks
security protocols
simultaneous authentication-of-equals
Smart Grid
smart grid mesh network security enhancement
neighborhood area networks
smart power grids
substation local area networks
Substations
trees (mathematics)
wireless LAN
wireless local area networks
wireless mesh networks
wireless sensor networks
WLAN
efficient mesh security association
Computer crime
computer network performance evaluation
computer network security
cost-ef- fective communications
Cryptographic Protocols
cyber attack
denial-of-service attack model
distributed mesh sensor networks
dynamic key distribution strategy updating
authentication
EMSA
HAN
home area networks
home networks
IEEE 802.11s
Logic gates
Merkle tree 4-way handshaking scheme
Mesh networks
NAN
biblio
Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic System
Submitted by BrandonB on Fri, 05/01/2015 - 9:46am
QoS violation
wireless mesh networks
Wireless communication
traffic type
traffic sending rate
traffic regulation scheme
traffic load scale
Throughput
telecommunication traffic
telecommunication congestion control
static routers
regulation process
real-time systems
queuing delays
queueing theory
quality of service
Ad hoc networks
QoS requirements
Protocols
network state
multimedia support
mobile ad hoc networks
mesh routers
Load management
lightly loaded buffers
interval type-2 fuzzy logic system
heavy traffic load
fuzzy control
delays
dedicated QoS protocols
buffer evolution
biblio
Selfish insider attacks in IEEE 802.11s wireless mesh networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:46am
Ad hoc networks
IEEE 802.11 Standards
IEEE 802.11s wireless mesh networks
Logic gates
Protocols
quality of service
Routing
selfish insider attacks
telecommunication security
wireless LAN
wireless mesh networks
biblio
Energy efficient techniques in Wireless Mesh Network
Submitted by BrandonB on Fri, 05/01/2015 - 9:45am
Logic gates
WMN
wireless network architecture
wireless mesh networks
wireless mesh network
Wireless communication
Throughput
smart devices
Routing
bandwidth hungry applications
IEEE 802.11 Standards
Evolution
energy efficient techniques
energy efficient network
Energy Efficiency
energy conservation
energy aware techniques
biblio
Intelligent wall mounted wireless fencing system using wireless sensor actuator network
Submitted by BrandonB on Fri, 05/01/2015 - 9:43am
wireless camera
multihop routing
multilevel detection mechanism
radio transceivers
safety systems
Software
telecommunication computing
telecommunication network routing
wall mounted wireless intrusion detection system
Monitoring
Wireless communication
wireless mesh network
wireless mesh networks
wireless sensor actuator network
Wireless Sensor Network
wireless sensor networks
Zigbee
intelligent wall mounted wireless fencing system
Cameras
cellular radio
central control station
Communication system security
electronic messaging
GSM modem
IEEE 802.15.4
IEEE 802.15.4 protocol
active RFID
Intrusion Detection
intrusion software
IR based intrusion detection system
IR based perimeter protection
IR transceiver module
microwave based intrusion detection
microwave sensor technology
biblio
Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:42am
radio aware optimized link state routing
WMN
wireless mesh networks
topology control
telecommunication network topology
telecommunication control
security mechanisms
security
Routing protocols
Routing Protocol
Routing
Cryptography
network simulator-3 simulations
IEEE 802.11 Standards
identity based encryption
IBE-RAOLSR protocols
IBE
hello messages
elliptic curve digital signature algorithm
ECDSA-RAOLSR protocols
digital signatures
delays
« first
‹ previous
1
2
3
4
5
6
7
8