Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internal attacks
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
SDN-based Misbehavior Detection System for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:44pm
sybil attacks
vehicular privacy standards
Sybil attack-resistant
Software-Defined Networking paradigm
SDN-based misbehavior Detection system
misbehavior detection systems
Misbehaving Detection Systems
cryptography solutions
context-aware MDS
voting
internal attacks
vehicular networks
Software Defined Networks
standards
computer network security
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Resiliency
software defined networking
Software
security
data privacy
Cryptography
Monitoring
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 10:57am
Loss measurement
Packet loss rate
ns-3 network simulator
network performance parameters
mobile nodes
mobile multihop network
MANET security measurement
internal attacks
intermediate nodes
end-to-end delay
blackhole nodes
blackhole attack feature extraction
Blackhole attack
AODV
AODV protocol
external attacks
IoT
mobile ad hoc network
Throughput
mobile ad hoc networks
MANET
network security
ns-3
Routing
Routing protocols
pubcrawl
Resiliency
feature extraction
security
telecommunication security
Internet-of-Things
Scalability
biblio
Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
resilience
Organizations
packet drop
Peer-to-peer computing
Protocols
pubcrawl
Quality metrics
Re-Routing
rejoining processing
Reliable Path
mobile computing
Resiliency
root nodes
Routing
Routing Protocol
Routing protocols
telecommunication channels
telecommunication network management
telecommunication security
wireless infrastructureless network
GroupKeyManagement
ad hoc environment
Ad hoc networks
Attack detection
authorized nodes
Compositionality
delays
dropped packets
EGSR schemes
group capacity
2ACK scheme
Hybrid based PSO
information transmission
internal attacks
MANET
MANETs
Metrics
mobile ad hoc network
mobile ad hoc networks
biblio
Elimination of internal attacksfor PUMA in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
multicast protocols
telecommunication security
single sender node
security
Routing protocols
Routing
Resiliency
resilience
receiver nodes
PUMA
pubcrawl
Protocol for Unified Multicasting through Announcements
network resources
multicast routing protocol
communication costs
multicast communication
multicast announcement packet fabrication attack
multicast activity-based overhearing technique
mobile ad hoc networks
Metrics
MANET
MA FabricationAttack
Key exchange
internal attacks
Group communication
fabrication
Conferences
Compositionality
biblio
Advanced Methodologies to Deter Internal Attacks in PTP Time Synchronization Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:59pm
network infrastructures
trusted platform modules
time synchronization supervisors
time synchronization
Synchronization
synchronisation
security
Resiliency
public key infrastructures
public key cryptography
pubcrawl
PTP time synchronization networks
Protocols
precision time protocol
network intrusion detection systems
accurate time synchronization
microsecond level
IP networks
internal attacks
industrial environments
device time synchronization
delays
cyber-attacks
Cyber Attacks
Cryptography
computer network security
computer network
composability
Clocks
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations