Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing Protocol
biblio
An Efficient and Reliable Routing Protocol Using Bio-Inspired Techniques for Congestion Control in WSN
Submitted by grigby1 on Wed, 12/02/2020 - 1:51pm
network performance
wireless sensor networks
Wireless Sensor Network
telecommunication congestion control
Scalability
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
Packet loss
AODV protocol
network delay
delays
cuckoo search algorithm
coupled congestion control
congestion recognition
congestion problem
congestion free path
Congestion Control
congested resources
bioinspired techniques
artificial bee colony algorithm.
biblio
An Efficient Secured Routing Protocol for Software Defined Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:48am
central point coordination
Human Factors
vehicular ad hoc network
Intelligent Transportation Systems
Internet of Vehicles
IoV
cyber physical systems
Routing Protocol
dynamic topology
Software Defined Networks
Energy efficient secured routing protocol
intelligence secure routing
intelligent transport system
network intelligence
RBM
restricted Boltzmann algorithm
software defined Internet of Vehicles
vehicle dynamics
Routing
Internet of Things
security
Software
software defined networking
Resiliency
Human behavior
pubcrawl
Routing protocols
computer network security
telecommunication power management
vehicular ad hoc networks
Metrics
internet
attacks
network lifetime
delays
telecommunication network topology
biblio
Cluster based Intrusion Detection System for Mobile Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
mobile ad hoc networks
voting
security of data
Routing protocols
Routing Protocol
route structure
Resiliency
pubcrawl
pattern clustering
node mobility
network traffics
network securities
monitoring process
Monitoring
mobility management (mobile radio)
mobile ad-hoc network
MANET Attack Detection
Metrics
memory overhead
MANET
malicious node
Intrusion Detection
DRINA Intrusion
Compositionality
clustering protocols
cluster based Intrusion detection planning
cluster
CBIDP
ad-hoc node security
Ad Hoc Network Security
active monitoring node
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
quality of service
wormhole attack detection
UAV swarm
UAV ad hoc network
UAANET
telecommunication security
SUAP
security of data
security mechanisms
security architecture
Secure UAV Ad hoc routing Protocol
secure routing protocol
Routing protocols
Routing Protocol
Resiliency
Real-world experiment
pubcrawl
performance evaluation
network integrity
network architecture
multiple node attack
multi-robot systems
mobile ad hoc networks
mobile ad hoc network
Metrics
message authentication
ground control station
Compositionality
autonomous aerial vehicles
aircraft communication
Ad Hoc Network Security
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
Metrics
unmanned aerial unit
uav
telecommunication security
security vulnerabilities
security
Routing protocols
Routing Protocol
Routing
Resiliency
pubcrawl
NS3 simulator
network security
mobile adhoc networks
mobile ad hoc networks
ad hoc on-demand distance vector routing
MANET security
MANET routing protocol
MANET AODV protocol
MANET
Loss measurement
IoT
Internet of Things
disaster recovery
delays
Compositionality
automata
AODV protocol
AODV based adhoc networks
biblio
Behaviour Analysis and Detection of Blackhole Attacker Node under Reactive Routing Protocol in MANETs
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
Scalability
Resiliency
pubcrawl
Routing
Routing protocols
collaboration
Throughput
MANETs
Ad hoc networks
mobile computing
AODV
Blackhole attack
Blackhole
Energy
PDR
Routing Protocol
biblio
A Trusted Routing Mechanism for Mobile Social Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
path trust level
trusted path
trusted DSR routing mechanism
Trust Routing
trust level
TDR protocol
social networking (online)
Scalability
Routing protocols
Routing Protocol
route cost
pubcrawl
composability
packet delivery fraction
network topology
network performance
network communication
MSN
mobile social networks
mobile social network
mobile radio
mobile computing
DSR routing protocol
computer network security
biblio
IPv6-Based Smart Grid Communication over 6LoWPAN
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
local electric transformer
CAS
customer agents
Electric Grid
electric utilities
energy data
energy usage
future demand growth
IEEE 2030.5
IEEE 802.15 Standard
IPv6-based smart grid communication system
Carleton University
Low-Power and Lossy Networks
MESH network
OpenLab IEEE 802.15.4 chips
Routing Protocol
self-healing mesh network
Smart City concept
transformer agent
Two-Way Communication
two-way communication system
utility
6LoWPAN
IoT
RPL
IP networks
Resiliency
pubcrawl
composability
Routing protocols
Routing
Reliability
smart power grids
security
Smart Grids
Smart Grid
Mesh networks
wireless LAN
Zigbee
communication technologies
Communication Network
personal area networks
IPv6
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
« first
‹ previous
1
2
3
4
next ›
last »