Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
packet delivery ratio
biblio
Fuzzy Logic Based WSN with High Packet Success Rate and Security
Submitted by grigby1 on Fri, 07/28/2023 - 3:33pm
Streaming media
Security of WSN
packet delivery ratio
Fuzzy Inference System (FIS)
Wireless Sensor Network
Fuzzy logic
remote sensing
vehicular ad hoc networks
Receivers
Schedules
Wireless communication
wireless sensor networks
Safety
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Performance Analysis of Internet of Things Routing Protocol for Low Power and Lossy Networks (RPL): Energy, Overhead and Packet Delivery
Submitted by aekwall on Mon, 11/29/2021 - 1:54pm
6LoWPAN
composability
Control Message Overhead
Cooja Simulator
electromagnetic interference
energy consumption
Internet of Things
Internet of Things Routing Protocol
packet delivery ratio
performance evaluation
pubcrawl
Resiliency
Routing protocols
standards
traffic control
biblio
Improving the Packet Delivery Reliability and Privacy Protection in Monitoring Wireless Networks
Submitted by grigby1 on Tue, 08/17/2021 - 4:32pm
Protocols
wireless sensor networks
Wireless Sensor Network
wireless networks
source location privacy
Routing Protocol
Routing
Resiliency
resilience
Reliability
pubcrawl
Compositionality
privacy
Position measurement
packet delivery ratio
Monitoring
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
end-to-end delay
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
protocol selection
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
cognitive radio
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
radio networks
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
Scalability
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
biblio
Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
mobile ad hoc networks
trust-based routing scheme
trust-based routing
telecommunication security
Scalability
Routing protocols
Routing Protocol
routing environment
Routing
Resiliency
reactive protocol
pubcrawl
packet delivery ratio
node data transfer mechanism
mobile nodes
Trust Routing
mobile ad hoc network
MANET
Energy states
data transaction
data retrieval
data packet
black-hole attack
Black hole attacks
Black hole attack
Attacker node
and trust-based scheme
Ad-hoc On-demand Distance Vector
Ad-doc On-Demand Distance Vector (AODV) protocol
biblio
Partially Predictable Vehicular Ad-hoc Network: Trustworthiness and Security
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
cloud
Trustworthiness Evaluation
secure trustworthiness evaluation based routing protocol
road traffic safety
road traffic efficiency
partially predictable vehicular ad-hoc network
Partially Predictable Network (PPN)
NS2 software
normalized routing overhead
Key-encrypted onion
intelligent communications
hybrid protocol
average end to end delay
road traffic
road safety
Relays
VANET
trustworthiness
packet delivery ratio
vehicular ad hoc networks
Routing
Routing protocols
composability
pubcrawl
Cryptographic Protocols
security
telecommunication security
Big Data
biblio
Prevention of DoS Attacks by Detection of Multiple Malicious Nodes in VANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Roads
network throughput
packet delivery ratio
Packet detection
packet detection algorithm
packet loss ratio
pubcrawl
resilience
Resiliency
network availability
Safety
Safety messages
Technology management
VANET
VANETs
vehicle nodes
vehicular ad hoc networks
vehicular adhoc network
driver safety
automation
Compositionality
computer network security
critical information
Denial of Service attacks
detection algorithms
DoS attacks
DoS attacks prevention
manet attack prevention
irrelevant data
irrelevant packets
Jamming
malicious nodes
MANET Attack Detection
Metrics
multiple malicious nodes
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
Comparitive Analysis of Blackhole and Rushing Attack in MANET
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
NS-2 network simulator
wireless networking technology
telecommunication security
Scalability
Rushing attack.
rushing attack
Routing protocols
Resiliency
resilience
pubcrawl
packet delivery ratio
AODV
network layer attack
mobile ad hoc networks
MANETs
MANET
end to end delay
data forwarding operations
centralized network administration
Blackhole attack
Black hole attack
AODV routing protocol
biblio
RAD: Reinforcement Authentication DYMO Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
demand protocol
Secret key
Compositionality
Encryption technique
mobility management (mobile radio)
malicious node
MANET security
authentication technique
average throughput
cryptographic operations
mobile ad hoc network
DYMO
dynamic MANET
infrastructure centralized server
MD5
Message Digest 5
RAD
reinforcement authentication DYMO protocol
Reinforcement.
Routing protocols
telecommunication security
Cryptographic Protocols
learning (artificial intelligence)
Resiliency
pubcrawl
Routing
Metrics
Reinforcement learning
authentication
encryption
message authentication
packet delivery ratio
telecommunication computing
delays
MANET
mobile ad hoc networks
Throughput
end to end delay
1
2
next ›
last »