Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Base stations
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
Primary User Authentication in Cognitive Radio Network Using Pre-Generated Hash Digest
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pregenerated hash digest
telecommunication security
sensors
Resiliency
resilience
radio networks
PUEA
pubcrawl
primary user emulation attack
primary user authentication
authentication
node authentication
emulation
Cryptography
CRN
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
Base stations
biblio
HCOBASAA: Countermeasure Against Sinkhole Attacks in Software-Defined Wireless Sensor Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
probability of false negative
wireless sensor networks
telecommunication security
software-defined wireless sensor cognitive radio network
Sinkhole attack
sink node
sensor nodes
Resiliency
resilience
pubcrawl
probability of false positive
Base stations
probability of detection
Performance Metrics
Hop Count-Based Sinkhole Attack detection Algorithm
HCOBASAA
detection algorithms
Databases
Communication system security
Cognitive Radio Security
cognitive radio
change in position
biblio
Implementation of a C-UNB Module for NS-3 and Validation for DLMS-COSEM Application Layer Protocol
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
random access
Metrics
network simulation module
ns-3
Physical layer
Policy
Policy Based Governance
policy governance
power meters
probability of successful transmission
Protocols
pubcrawl
medium access control layer
remote site
resilience
Resiliency
Servers
smart meters
smart power grids
ultra narrow band
urban area
wide area networks
Zigbee
Device Language Message Specification-Companion Specification
Adaptation models
advanced metering infrastructure
asynchronous bandwidth devices
bandwidth channels
Base stations
C-UNB wireless networks
cellular radio
clean slate
clean-slate cellular network technology
collaboration
access protocols
DLMS-COSEM application layer protocol
embedded devices
Human behavior
Human Factors
Internet of Things (IoT)
lightweight random access protocol
low-bandwidth devices
low-power wide area wireless network technologies
machine-to-machine (M2M)
Mathematical model
biblio
Reputation and trust based selfish node detection system in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobile ad hoc network
trust based selfish node detection system
telecommunication network routing
selfish
Routing protocols
routing layer
Routing
Resiliency
pubcrawl
packet forwarding
node authentication
node
network channel jamming
mobile ad hoc networks
Base stations
misbehavior
Metrics
Measurement
MANETs
MANET Attack Detection
MANET
Load modeling
detection
control systems
Conferences
composability
cellular telephones
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
smart toasters
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grid Sensors
smart grid stations
Smart Grids
pubcrawl
smartphone
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
Human behavior
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
attacks
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
biblio
STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
Metrics
trust level
telecommunication security
STAODV
service attack
security
secure trust based approach
Routing protocols
Routing
Resiliency
resilience
pubcrawl
participating node
network layer
network architecture
mobile ad hoc networks
adjacent nodes
MANET security
MANET force
MANET
malicious node
Conferences
Computational modeling
Compositionality
blackhole attack mitigation
Blackhole attack
Base stations
autonomous nodes
attack mitigation
AODV routing protocol
AODV based MANET
AODV
biblio
Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
power system faults
message spoofing attacks
Metrics
packet radio networks
power engineering computing
power grid efficiency
power grid system
power grid vulnerability analysis
power grids
internet
power system reliability
power system security
pubcrawl
resilience
Resiliency
SCADA
SCADA systems
security of data
cyber-attacks
Base stations
Cascading Failures
cellular radio
complex CPPS
complex cyber physical power system
composability
Compositionality
Cyber Attacks
authentication
Cyber-physical power system (CPPS)
DoS attacks
DTU
general packet radio service
GPRS
GPRS-based SCADA systems
Ground penetrating radar
IEEE 9-node system
biblio
Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
resilience
WIoT environments
wearables security
Wearable IoT
wearable Internet-of-Things
Training
sensor-hijacking attacks
security of data
security
Scalability
resource-constrained wearable IoT systems
Resource constrained
Resiliency
Amulet platform
pubcrawl
privacy
Internet of Things
Human behavior
feature extraction
Electrocardiography
data-driven security solutions
Data-driven security solution
Biomedical monitoring
batteries
Base stations
biblio
Target Tracking Optimization of UAV Swarms Based on Dual-Pheromone Clustering
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
surveillance result propagation
Aircraft
wireless communication interface
Unmanned Aerial Vehicles
UAV swarm
UAV network connectivity
temporarily invisible targets
target tracking optimization
target tracking
target detection
ant colony optimisation
surveillance mission
surveillance
stable overlay network
Resiliency
repulsive pheromones
object detection
reconnaissance mission
pubcrawl
pattern clustering
data sharing
Network reconnaissance
multihop clustering
multi-robot systems
map coverage performance
dual-pheromone clustering hybrid approach
dual-pheromone ant-colony model
DPCHA
disappearing target model
autonomous aircraft
autonomous aerial vehicles
coverage fairness
connection volatility
communication range
collaborative swarm
Clustering algorithms
cluster stability
Base stations
attractive pheromones
Atmospheric modeling
« first
‹ previous
1
2
3
4
5
next ›
last »