Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
base station
biblio
Intrusion detection systems in MANETs using hybrid techniques
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
RSA algorithm
mobile ad hoc networks
pubcrawl
public key cryptography
resilience
Resiliency
Routing
Routing protocols
RSA
Metrics
security
security of data
self organized wireless technologies
SHA 256 hashing technique
telecommunication security
ZRP
ZRP routing protocol
AES
MANET
intrusion detection system technique
Intrusion Detection
IDS technique
hybrid cryptographic technique
enhanced adaptive acknowledgement
EAACK
data authentication
Cryptography
Cryptographic Protocols
Compositionality
base station
AODV routing protocol
AODV
AES algorithm
biblio
Boosting Anonymity in Wireless Sensor Networks
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
resilience
wireless sensor networks
Wireless Sensor Network
traffic pattern
telecommunication security
telecommunication network topology
sensor nodes
security
Routing
ring nodes
Resiliency
anonymity
pubcrawl
privacy
Monitoring
Mobile communication
mobile BS
Metrics
Mathematical model
Human behavior
composability
base station
biblio
A Comparative Study of Data Aggregation Approaches for Wireless Sensor Networks
Submitted by grigby1 on Tue, 09/05/2017 - 1:48pm
aggregators
base station
data aggregation
efficiency
Human behavior
pubcrawl
Reliability
Resiliency
Scalability
sensor security
wireless sensor networks
biblio
Energy Efficient Network Deployment With Cell DTX
Submitted by BrandonB on Tue, 05/05/2015 - 9:58am
maximum achievable energy saving
Vectors
traffic variation
traffic profile
telecommunication power management
sleep mode operations
quality of service
Power demand
Planning
network deployment
base station
Load modeling
Interference
energy efficient network deployment
Energy Efficiency
energy consumption
cellular radio
cell load
cell DTX
cell discontinuous transmission
biblio
An energy-efficient routing technique for privacy preservation of assets monitored with WSN
Submitted by BrandonB on Mon, 05/04/2015 - 1:46pm
phantom source
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication power management
Routing protocols
Routing
privacy preservation
privacy
Phantoms
asset monitoring
phantom node
Monitoring
fake packet injection technique
energy efficient routing technique
energy conservation
endangered species monitoring
delays
data privacy
Base stations
base station
« first
‹ previous
1
2