Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Base stations
biblio
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory
Submitted by K_Hooper on Wed, 12/20/2017 - 10:29am
inference mechanisms
uncertainty handling
telecommunication computing
sensors
security of data
Safety
Resiliency
Reliability
pubcrawl
local IDS agent
local detection decisions
Intrusion Detection
Base stations
IDS Agent
distributed intrusion detection system
Dempster-Shafer's evidence theory
Dempster-Shafer evidence theory
Data collection
D-S evidence theory
CRN
cooperative detection center
Cognitive Radio Security
cognitive radio networks
cognitive radio
biblio
New LQR Protocols with Intrusion Detection Schemes for IOT Security
Submitted by grigby1 on Tue, 12/12/2017 - 12:29pm
Monitoring
wireless sensor networks
Wireless Sensor Network
Wireless communication
Routing protocols
Routing
Resiliency
pubcrawl
network intrusion detection
Base stations
Metrics
Link Quality Routing
IoT security
Internet of Things
Human Factors
Human behavior
estimation
composability
biblio
An efficient and scalable key management mechanism for wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:38pm
processing overheads
wireless sensor networks
telecommunication security
telecommunication network topology
telecommunication network management
sensors
sensor nodes
security
secure wireless sensor networks
secret sharing techniques
scalable key management mechanism
reduced memory size
public key cryptography
Public key
Base stations
network topology
limited computation capability
large size networks
key management
key distribution schemes
group communications
encryption keys
Elliptic curves
elliptic curve public key encryption
Elliptic curve cryptography
Diffie-Hellman like key exchange
battery-based power supply
biblio
An efficient and hybrid key management for heterogeneous wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:34pm
heterogeneous wireless sensor networks
wireless sensor networks
telecommunication security
telecommunication network management
symmetric encryption
sensor nodes
sensor network security
public key encryption method
key management
hybrid key management
asymmetric key cryptography
heterogeneous sensor networks
energy consumption
encryption
Elliptic curve cryptography
Cryptography
communication security
cluster heads
Base stations
biblio
A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:58am
public key cryptography
wireless sensor networks
Wireless Sensor Network
statistical en-route filtering
Statistical En-Route
security
secure routing method
Secure Routing
Routing protocols
Routing
ad hoc on demand distance vector protocol
Protocols
individual sensor nodes
Gray hole attack
false report detection
Elliptic curve cryptography
ECC
Base stations
AODV protocol
AODV
biblio
Confidentiality-Preserving Control of Uplink Cellular Wireless Networks Using Hybrid ARQ
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
Automatic repeat request
Base stations
Cross-layer optimization
Decoding
Heuristic algorithms
hybrid automatic repeat request (ARQ)
Mutual information
physical-layer security
Uplink
wireless networks
biblio
Exploring the potential for full-duplex in legacy LTE systems
Submitted by BrandonB on Tue, 05/05/2015 - 8:58am
Base stations
Cellular networks
Downlink
FD-LTE
Frequency conversion
full-duplex communications
interference suppression
Long Term Evolution
LTE systems
passive SI cancellation schemes
radio spectrum management
receiving antennas
self-interference suppression
Silicon
spectral efficiency
Uplink
biblio
Urban traffic commuting analysis based on mobile phone data
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
OD information
urban traffic commuting analysis
trip generation mechanism
trip attraction
traffic information systems
traffic information extraction
Statistics
Sociology
real-time systems
pattern clustering
Base stations
mobile phone data acquisition
Mobile handsets
mobile computing
Mobile communication
k-means clustering algorithm
feature extraction
data acquisition
Cities and towns
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 12:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations
biblio
OSAP: Optimal-cluster-based source anonymity protocol in delay-sensitive wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 12:47pm
network traffic
wireless sensor networks
wireless networks
telecommunication traffic
telecommunication security
source anonymity
security
real event report latency
Protocols
OSAP
optimal cluster based source anonymity protocol
network traffic reduction
Base stations
mobile computing
Mobile communication
global attacker
fake packet injection
event source location privacy
event source anonymity
delays
delay sensitive wireless sensor networks
data privacy
cluster-based wireless sensor network
challenging attack model
« first
‹ previous
1
2
3
4
5
next ›
last »