Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
WLAN
biblio
Extending the FLExible Network Tester (Flent) for IEEE 802.11s WLAN Mesh Networks
Submitted by grigby1 on Fri, 12/02/2022 - 10:16am
Linux
network performance
Measurement Tools
IEEE 802.11s
Flent
Mesh networks
wireless mesh networks
WLAN
wireless LAN
Software measurement
pubcrawl
Routing
composability
performance evaluation
Throughput
Software
Resiliency
resilience
Metrics
biblio
Vulnerability Analysis of Wireless LAN Networks using ISSAF WLAN Security Assessment Methodology: A Case Study of Restaurant in East Jakarta
Submitted by grigby1 on Fri, 11/18/2022 - 1:49pm
Cryptography
evil twin attack
Security by Default
WLAN
Informatics
Penetration Testing
Wireless fidelity
vulnerability assessment
Firewalls (computing)
Servers
authentication
Scalability
security
Software
Resiliency
resilience
pubcrawl
biblio
Throughput Control Method Between Different TCP Variants Based on SP-MAC Over WLAN
Submitted by grigby1 on Wed, 12/02/2020 - 12:52pm
throughput guarantee control method
Synchronization
Synchronization phenomena of Coupled oscillator
synchronization phenomena of coupled oscillators
TCP variants
TCP versions
telecommunication congestion control
Throughput
throughput control method
synchronisation
total throughput
transport protocols
Wireless communication
wireless LAN
wireless local area networks
wireless terminals
WLAN
media access control method
access protocols
carrier sense multiple access
collision avoidance
Compound TCP
Compounds
coupled congestion control
CUBIC-TCP
media access control
access point
Media Access Protocol
Oscillators
pubcrawl
resilience
Resiliency
Scalability
SP-MAC
biblio
Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
Submitted by aekwall on Mon, 08/10/2020 - 9:33am
prominent network interface
Mobile communication
WLAN
Metrics
Android devices
application usage information
encrypted wireless traffic
Internet gateways
lightweight programmable privacy framework
PrivacyGuard framework
edge
software defined network-like paradigm
traffic shaping
WiFi encryption
WiFi links
WiFi networks
wireless network edge
wireless traffics
android encryption
Cryptography
Scalability
telecommunication traffic
Internet of Things
software defined networking
Resiliency
Human behavior
pubcrawl
privacy
IoT
smart phones
Mobile Applications
wireless LAN
Wireless fidelity
Software Defined Network
Wireless communication
mobile device
sensitive information
biblio
Research on Block Chain Network Intrusion Detection System
Submitted by grigby1 on Tue, 01/21/2020 - 10:20am
intrusion tolerance
WLAN
Wireless communication
system security
Resiliency
resilience
pubcrawl
network intrusion detection
network intrusion
Monitoring
Metrics
Block Chain
Intrusion Detection Systems
Intrusion Detection
detection system
computer network security
composability
Communication system security
blockchain
block chain network intrusion security
block chain network intrusion privacy
block chain network intrusion detection system
biblio
Hash based efficient secure routing for network communication
Submitted by BrandonB on Wed, 05/06/2015 - 7:55am
mobile computing
WLAN
telecommunication security
security
Routing protocols
Routing Protocol
Routing
power backup
packet transfer
networking
network communication
Mobility
Ad hoc networks
Mobile communication
mobile ad-hoc networks
Mobile Ad-hoc
mobile ad hoc networks
infrastructure wireless networks
hash based efficient secure routing
energy problem
Cryptographic Protocols
autonomous network
authentication
attack
biblio
Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
Submitted by BrandonB on Fri, 05/01/2015 - 8:47am
Smart Grids
network performance
network resiliency improvement
plant-generation local area networks
Protocols
SAE
security attacks
security protocols
simultaneous authentication-of-equals
Smart Grid
smart grid mesh network security enhancement
neighborhood area networks
smart power grids
substation local area networks
Substations
trees (mathematics)
wireless LAN
wireless local area networks
wireless mesh networks
wireless sensor networks
WLAN
efficient mesh security association
Computer crime
computer network performance evaluation
computer network security
cost-ef- fective communications
Cryptographic Protocols
cyber attack
denial-of-service attack model
distributed mesh sensor networks
dynamic key distribution strategy updating
authentication
EMSA
HAN
home area networks
home networks
IEEE 802.11s
Logic gates
Merkle tree 4-way handshaking scheme
Mesh networks
NAN