Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Base stations
biblio
Evolving Dynamically Reconfiguring UAV-hosted Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 3:45pm
quick temporary networked communications capabilities
MESH network
bandwidth requirements
different user distributions
evolutionary adaptive network deployment algorithm
evolving dynamically reconfiguring UAV-hosted mesh networks
flying network base stations
initial deployment
overwatch
potential field parameters
potential fields
remotely operated vehicles
remote areas
reposition UAVs
scouting
tuned potential fields
UAV network
Unmanned Aerial Vehicles
unmanned aerial vehicles networks
user bandwidth coverage
user bandwidth needs
Wireless Mesh Network Security
mobile radio
Resiliency
pubcrawl
composability
batteries
wireless sensor networks
Metrics
mobile robots
Training
optimisation
network lifetime
security
genetic algorithm
genetic algorithms
Bandwidth
Mesh networks
control engineering computing
Path Planning
autonomous aerial vehicles
Base stations
distributed control
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
Congestion aware traffic grooming in elastic optical and WiMAX network
Submitted by grigby1 on Wed, 12/02/2020 - 12:52pm
telecommunication network topology
Relays
resilience
Resiliency
resource allocation
Routing
Scalability
telecommunication congestion control
telecommunication network routing
pubcrawl
telecommunication traffic
Traffic grooming
WDM-PON (Wavelength Division Multiplexed Passive Optical Network)
WiMax
WiMAX network
wireless networks
Wireless-Optical/Optical-Wireless Network
Worldwide Interoperability Microwave Access Network
Light trail WiMAX (World Interoperability for Microwave Access Network)
Base stations
BVT (Bandwith Variable Transponder)
congestion aware traffic
coupled congestion control
Coupled Congestion Control 2019
Elastic Optical Network
internet
internet accessibility
Bandwidth
network congestion
network resource consumption
network resource utilization
network topologies
OLT (Optical Line Terminal)
ONU (Optical Network Unit)
Passive Optical Network
Passive optical networks
biblio
Secure Information Exchange in Defining the Location of the Vehicle
Submitted by grigby1 on Mon, 11/02/2020 - 11:10am
location determination
Wireless fidelity
Vehicular Communication
telecommunication security
smart roads
security protocols
security
Roads
Resiliency
resilience
radionavigation
pubcrawl
Protocols
Metrics
automobiles
locating
Internet of Vehicles
information security
information exchange
Human Factors
Global Positioning System
Electric Vehicles
electric vehicle market
effective secure communication protocol
car control system
Base stations
base station
biblio
Multi-branch Source Location Privacy Protection Scheme Based on Random Walk in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
multibranch source location privacy protection method
radiofrequency interference
WSN
source node
location privacy preservation
communication overhead
Position measurement
location security
branch interference area
location-related data
Base stations
multibranch source location privacy protection scheme
multiple branch
multiple proxy sources
proxy source
random walk
sensing information
sink location privacy
Location Privacy in Wireless Networks
privacy
data privacy
telecommunication security
security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
location privacy
Monitoring
Routing
sensor nodes
Metrics
random processes
network lifetime
base station
Compositionality
privacy protection
biblio
Encircling the Base Station for Source Location Privacy in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
Base stations
Location Privacy in Wireless Networks
source location privacy
signal strength
routing schemes
routing information
packet delivery
Location Privacy breach
incoming packet
dummy traffic
dummy packets
delay
base station
Phantoms
privacy breaches
TTL
telecommunication traffic
Compositionality
sensors
encryption techniques
telecommunication network routing
Metrics
Cryptography
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
Submitted by aekwall on Mon, 03/30/2020 - 10:42am
quantum computers
wireless sensor networks
Wireless Sensor network communication
ubiquitous internetworking
tiny sensor nodes
telecommunication security
stage permeated filtering mechanism
security of data
Scalability
resource-aware security
Resiliency
quantum cryptography
quantum computing security
quantum computing
Pervasive Computing Security
pubcrawl
Predictive Metrics
lightweight quantum-safe security concept
Intrusion Detection Systems
internetworking
Internet of Things
filtering theory
distributed sensor nodes
contemporary cryptographic mechanisms
Computers
composability
Ciphers
Base stations
biblio
Analytical Study on Mobile Ad Hoc Networks for IPV6
Submitted by grigby1 on Tue, 01/21/2020 - 11:08am
Mobile impromptu systems
wireless gadget connections
Wireless communication
transport protocols
telecommunication traffic
Technological innovation
TCP-IP
steering conventions
self arranging system
Resiliency
resilience
pubcrawl
protocol
policy-based governance
pervasive computing
Base stations
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
IPV6 systems
ipv6 security
IPv6 MANET
IPv4 MANET
IP networks
Handheld computers
computer network security
composability
Communication system security
collaboration
biblio
Context-Aware Trust Management System for IoT Applications with Multiple Domains
Submitted by aekwall on Mon, 01/13/2020 - 11:06am
reputation systems
context-aware trust management system
context-aware trust model
context-aware trust models
context-based trust evaluation
distributed resource-constrained IoT devices
heterogeneous devices
lightweight IoT devices
reputation system
Context-Aware Trust Evaluation
service provider
smart wildlife
Traffic Management
Trust Management System
trust values
trustworthiness record
Wildlife
IoT
Context modeling
context items
context information
Base stations
Trust management
ubiquitous computing
6LoWPAN
composability
pubcrawl
Resiliency
Trusted Computing
performance evaluation
IoT applications
Internet of Things
computer network security
biblio
Detection of False Data in Wireless Sensor Network Using Hash Chain
Submitted by grigby1 on Mon, 12/30/2019 - 1:22pm
hash chain
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
sensor nodes
Resiliency
resilience
pubcrawl
Mathematics
Human behavior
Hostile Environment
authentication
False Data Injection
false data filtering schemes
False Data Detection
encryption
data integrity
cyber physical systems
Cryptography
composability
bogus data
Base stations
« first
‹ previous
1
2
3
4
5
next ›
last »