Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
energy consumption
biblio
Privacy Protection Scheme in Smart Grid Using Rechargeable Battery
Submitted by grigby1 on Mon, 03/09/2020 - 2:57pm
Scalability
Metrics
policy-based governance
privacy
privacy protection scheme
pubcrawl
rechargeable battery
resilience
Resiliency
Information Leakage
secondary cells
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
statistical methods
user privacy
electrical power
automation
batteries
battery power information
collaboration
composability
data privacy
Educational institutions
electrical load information
Abstracts
Electronic mail
energy consumption
heuristic algorithm
home energy use information
home network
Human behavior
Human Factors
biblio
Balanced Load Clustering with Trusted Multipath Relay Routing Protocol for Wireless Sensor Network
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
quality of service
WSN
wireless sensor networks
Wireless Sensor Network
wireless channels
trusted multipath relay routing
trust values
Trust Routing
telecommunication security
Scalability
Routing protocols
relay node
relay networks (telecommunication)
balanced load clustering
pubcrawl
pattern clustering
network simulation software
multipath trust
multipath channels
malicious activity trusted multipath relay routing protocol
Hybrid medium access control (HMAC)
Energy Efficiency
energy consumption
composability
balanced load clustering concepts
biblio
Trust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT
Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
routing protocol for low power and lossy network
trustworthy nodes
trust-based enhanced secure RPL routing attacks
trust value
Trust Routing
trust evaluation methods
sybil attacks
Sybil attack
standardized proactive routing protocol
security
Secure DODAG Construction
Sec-Trust protocol
Scalability
RPL security
Routing protocols
composability
Routing
resource constrained characteristics
rank attack
pubcrawl
providing routing security using the technique of collective trust mechanism
PROTECT
performance evaluation
IoT network
IoT
Internet of Things
forwarding data packets
energy consumption
computer network security
biblio
Client-Side Verification Framework for Offline Architecture of IoT
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
sensors
Smart Grid Sensors
smart grid system
smart garbage collection
offline architecture
client-side verification framework
IoT systems
XML
Compositionality
smart cities
indexing
storage management
Network
Human Factors
IoT
Smart homes
Urban areas
energy consumption
Web servers
Smart Grids
pubcrawl
Resiliency
mobile computing
security
Hardware
Internet of Things
Conferences
computer network security
biblio
Attribute Based Trust Evaluation for Secure RPL Protocol in IoT Environment
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
Resiliency
location based service authentication
Low-Power and Lossy Networks
Medical services
memory requirements
personal area networks
physical objects
Protocols
pubcrawl
Public key
location based service
Routing
Routing protocols
RPL
secure RPL Protocol
security
security attacks
smart health care system
Symmetric matrices
Data collection
6LoWPAN networks
ABTE
advanced automation technology
attribute based trust evaluation
authentication
composability
computer network reliability
computer network security
critical data transfer reliability
6LoWPAN
energy constraint networks
energy consumption
Internet of Things
IoT constrained environments
IPv6 Routing Protocol
LBS
lightweight LBS authentication
LL networks
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
illegitimate sensor nodes
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
cluster formation game
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
Computational modeling
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
security
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
biblio
Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks
Submitted by aekwall on Mon, 06/24/2019 - 3:00pm
Resiliency
policy-based governance
power system security
privacy
privacy concerns
privacy preserving fine-grained data distribution aggregation
pubcrawl
Public key
real-time fine-grained monitoring
real-time systems
parent smart meter
Smart Grid
smart grid AMI networks
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Metering
smart meters
smart power grids
Topology
fine-grained consumption
collected metering data
Companies
consumption distribution
data privacy
distribution
energy consumption
energy consumption data
energy demand forecasting
fine-grained
advanced metering infrastructure
fine-grained metering data reporting
future energy production
Human behavior
individual consumers
intended demand response service
Metrics
network topology
network tree topology structure
biblio
Energy Demand Scheduling Based on Game Theory for Microgrids
Submitted by aekwall on Mon, 06/24/2019 - 2:59pm
Resiliency
Minimization
modern grids
opportunity
optimisation
optimization
policy-based governance
pubcrawl
renewable energy sources
minimal interactions
scheduling
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
smart power grids
Task Analysis
total energy cost
electricity grids
constrained optimization problem
consumer demand management
consumers
consumption scheduling
demand side management
demand-side management systems
distributed energy demand scheduling approach
distributed power generation
Buildings
energy consumption
game theory
Human behavior
interesting challenges
Metrics
Microgrids
minimal information exchange
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »