Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile networks
biblio
Multicast Design for the MobilityFirst Future Internet Architecture
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
MobilityFirst future Internet architecture
clean slate future Internet architecture
efficient multicast mechanism
fifth generation network
hierarchical multicast packet header
interdomain mobile scenario
low-cost dynamic multicast routing
mobile consumers
mobility support
MobilityFirst architecture
clean separation
multicast design
multicast group members
multicast prototype system
multicast service
multicast source
network location
wireless access
clean slate
policy governance
5G mobile communication
mobile computing
computer architecture
Resiliency
Human behavior
pubcrawl
Routing
Metrics
internet
telecommunication network routing
Protocols
Logic gates
identity
mobile networks
mobile devices
mobility management (mobile radio)
network resources
mobile nodes
multicast communication
5g network
biblio
Intelligence Slicing: A Unified Framework to Integrate Artificial Intelligence into 5G Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
advanced radio transmission
artificial intelligence security
wireless networks
transmitting antennas
networking techniques
mobile networks
MIMO communication
Intelligence slices
industrial network security
fifth-generation networks
channel prediction
autonomous network management
artificial intelligence technology
AI module
AI algorithms
security
5G networks
network infrastructure
neural network
wireless channels
Task Analysis
resource allocation
Prediction algorithms
telecommunication network management
telecommunication computing
5G mobile communication
telecommunication security
pubcrawl
Artificial Intelligence
biblio
Enhancing Security and Scalability in Software Defined LTE Core Networks
Submitted by aekwall on Mon, 06/17/2019 - 9:29am
next generation networks
telecommunication traffic
telecommunication security
software defined networking
software defined LTE core networks
Software
security scalability
security enhancement
security
scalable tunnel establishment
scalable channel security scheme
Scalability
pubcrawl
cellular radio
Next generation networking
next generation cellular network
mobile subscribers
Mobile Security
mobile networks
mobile network design
Mobile communication
LTE core network
Long Term Evolution
Local area networks
composability
Cloud Computing
biblio
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones
Submitted by grigby1 on Thu, 01/31/2019 - 11:17am
instant messaging applications
user chat message details
Smartphones
smart phones
Scalability
Resiliency
resilience
pubcrawl
mobile users
mobile networks
mobile forensic investigations
mobile devices
mobile computing
Metrics
local artifacts
instant messaging chat modes
android
instant messaging application
Instant messaging
Humanoid robots
Human Factors
Human behavior
electronic messaging
Digital Forensics
digital forensic analysis
digital forensic
Databases
Androids
Android smartphones
Android operating systems
android encryption
Android (operating system)
biblio
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks
Submitted by grigby1 on Tue, 09/05/2017 - 12:43pm
attack
composability
defense
IMs
LTE
Metrics
mobile networks
network accountability
pubcrawl
Resiliency
SMS
spam detection
threat mitigation
biblio
Privacy Challenges in Mobile and Pervasive Networks
Submitted by grigby1 on Tue, 08/22/2017 - 10:53am
Human behavior
mobile networks
pervasive computing
pervasive networks
privacy and security
pubcrawl
Resiliency
Scalability
biblio
"Hiding User Privacy in Location Base Services through Mobile Collaboration"
Submitted by grigby1 on Thu, 02/23/2017 - 10:40am
mobile networks
Web surfing
web services
user privacy
telecommunication security
Smartphones
smart phones
Servers
pubcrawl170105
privacy
Peer-to-peer computing
mobility management (mobile radio)
collaboration
mobile crowd method
Mobile communication
mobile collaboration
location-based services
location privacy
location base services
location aware system
LBS server
GPS
Global Positioning System
biblio
Towards efficient group management and communication for large-scale mobile applications
Submitted by BrandonB on Wed, 05/06/2015 - 1:14pm
Manganese
vehicles
surveillance
Subscriptions
reliable communication
real-time tracking
Real-time monitoring
public security
node mutual awareness
mobile workforce management
mobile systems
mobile nodes
mobile networks
mobile computing
middleware
collaboration
Logistics
Logic gates
large-scale mobile applications
group management
Group communication
geopositioning
fleet tracking and management system
Emergency Response
distributed middleware
DDS
context-specific group communication
context-defined groups
context-defined group management
biblio
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Submitted by BrandonB on Wed, 05/06/2015 - 9:10am
malware
wireless links
service requests
quadratic growth
Peer-to-peer computing
node mobility
network bandwidth
mobility range
mobile services
mobile nodes
mobile networks
mobile malware
mobile computing
mobile botnets
botnet propagation storms
last chipper time
invasive software
Internet botnets
internet
exponential growth
epidemic modeling
distributed mechanism
denial-of-service impact
data forwarding
coordinated attacks
computer network security
compromised nodes
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
1
2
next ›
last »