Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
base station
biblio
Trust Evaluation for Securing Compromised data Aggregation against the Collusion Attack in WSN
Submitted by aekwall on Mon, 06/28/2021 - 11:31am
network lifetime
false trust
tree
magnetic heads
Routing
Wireless Sensor Network
Base stations
cluster
sensors
base station
Scalability
Clustering algorithms
wireless sensor networks
data aggregation
policy-based governance
pubcrawl
Resiliency
security
architecture
biblio
WSNB: Wearable Sensors with Neural Networks Located in a Base Station for IoT Environment
Submitted by grigby1 on Thu, 05/20/2021 - 11:14am
neural network
wearables security
EEG signal
base station
wearable sensor
Accuracy
Wearable sensors
Base stations
clustering
Intelligent sensors
Labeling
Internet of Things
wireless sensor networks
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Neural networks
privacy
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
Secure Information Exchange in Defining the Location of the Vehicle
Submitted by grigby1 on Mon, 11/02/2020 - 11:10am
location determination
Wireless fidelity
Vehicular Communication
telecommunication security
smart roads
security protocols
security
Roads
Resiliency
resilience
radionavigation
pubcrawl
Protocols
Metrics
automobiles
locating
Internet of Vehicles
information security
information exchange
Human Factors
Global Positioning System
Electric Vehicles
electric vehicle market
effective secure communication protocol
car control system
Base stations
base station
biblio
Multi-branch Source Location Privacy Protection Scheme Based on Random Walk in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
multibranch source location privacy protection method
radiofrequency interference
WSN
source node
location privacy preservation
communication overhead
Position measurement
location security
branch interference area
location-related data
Base stations
multibranch source location privacy protection scheme
multiple branch
multiple proxy sources
proxy source
random walk
sensing information
sink location privacy
Location Privacy in Wireless Networks
privacy
data privacy
telecommunication security
security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
location privacy
Monitoring
Routing
sensor nodes
Metrics
random processes
network lifetime
base station
Compositionality
privacy protection
biblio
Context-Oriented Privacy Protection in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:03am
Metrics
WSN
wireless sensor networks
telecommunication security
security measures
security breaches
Resiliency
pubcrawl
privacy
base station
Location Privacy in Wireless Networks
location privacy
location data
Human behavior
data privacy
context-oriented privacy protection
context oriented
Compositionality
biblio
Encircling the Base Station for Source Location Privacy in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
Base stations
Location Privacy in Wireless Networks
source location privacy
signal strength
routing schemes
routing information
packet delivery
Location Privacy breach
incoming packet
dummy traffic
dummy packets
delay
base station
Phantoms
privacy breaches
TTL
telecommunication traffic
Compositionality
sensors
encryption techniques
telecommunication network routing
Metrics
Cryptography
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 2:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
mobile computing
wireless technology
telecommunication security
telecommunication network topology
security challenges
security
Routing protocols
Routing
router
Resiliency
resilience
pubcrawl
mobile nodes
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs Security
MANETs Attacks
MANET topology
MANET security
MANET protocol stack
Compositionality
blackhole attacks
base station
biblio
Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security
Submitted by aekwall on Mon, 03/25/2019 - 8:58am
optimal beamforming matrix
Downlink
downlink cellular network
eavesdroppers
Interference
legitimate mobile stations
multiple beam forming matrices
novel pseudorandom beamforming technique
opportunistic feedback
opportunistic scheduling
cellular radio
orthogonal beamforming vectors
radio links
Random beamforming
received signal-to-interference-and-noise ratio value
received SINR value
secrecy rate
secrecy sum-rate maximization
signal processing security
Signal to noise ratio
security
Resiliency
pubcrawl
composability
Wireless communication
matrix algebra
Metrics
Vectors
telecommunication security
physical-layer security
antenna arrays
antennas
array signal processing
base station
beam selection
BS
Cellular networks
1
2
next ›
last »