Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RSSI
biblio
A RSSI-Based Mesh Routing Protocol based IEEE 802.11p/WAVE for Smart Pole Networks
Submitted by grigby1 on Fri, 12/02/2022 - 10:16am
simulation
wireless mesh network
WAVE
smart pole
IEEE 802.11p
Channel allocation
Mesh networks
wireless mesh networks
RSSI
Routing Protocol
pubcrawl
Measurement
Switches
Routing
composability
Wireless communication
Throughput
Resiliency
resilience
Metrics
biblio
Secure Digital Signature Validated by Ambient User amp;\#x2019;s Wi-Fi-enabled devices
Submitted by grigby1 on Tue, 04/26/2022 - 1:50pm
public-key
Wi-Fi
validation
Servers
Seals
Scalability
RSSI
Resiliency
resilience
Receivers
digital signature
Public key
pubcrawl
private-key
Mobile handsets
information technology
email spoofing
Electronic mail
digital signatures
biblio
TS2FA: Trilateration System Two Factor Authentication
Submitted by grigby1 on Thu, 07/08/2021 - 2:37pm
pubcrawl
Wireless fidelity
two-factor authentication
two factor authentication
TS2FA
Trilateration System
Servers
RSSI
QR
ambient access points
password
OTP
NFC
Mobile handsets
Mathematical model
Human Factors
Human behavior
authentication
biblio
SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
mobility conditions
ACO
ad hoc network
ant colony optimisation
Ant colony optimization
guaranteed QoS performance
Malicious Attacker
malicious attackers
MANET open nature network
MANET routing protocols
mobile nodes
opportunistic routing protocol
QoS aware protocol
QoS improvement algorithm
RSSI measurements
Secure-QMAA
security Algorithm
security-QoS mobility aware ACO routing protocol
SQMAA
RSSI
authorisation
Data Security
telecommunication security
security
network security
Resiliency
pubcrawl
Routing protocols
Routing
Scalability
Swarm Intelligence
quality of service
secure communication
mobile ad hoc networks
Blackhole attack
mobility management (mobile radio)
DoS attacks
user authentication
biblio
Enhance Wireless Security System Using Butterfly Network Coding Algorithm
Submitted by aekwall on Mon, 04/06/2020 - 8:56am
IoT system
wireless sensing network
wireless security system
Wi-Fi module
traditional security system
system indicators
Received signal strength indication (RSSI)
received signal strength indication
network transmission
Network node routing
butterfly network coding algorithm
Butterfly network coding (BNC) algorithm
cyber physical systems
telecommunication security
encoding
network coding
Predictive Metrics
security monitoring
wireless LAN
Decoding
RSSI
wireless sensor networks
composability
pubcrawl
Resiliency
Internet of Things (IoT)
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist
biblio
Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication
Submitted by grigby1 on Mon, 08/26/2019 - 10:10am
pubcrawl
ZigBee packets
Zigbee
wireless sensor networks
wireless networks
wireless LAN
Wireless fidelity
Wi-Fi devices
telecommunication security
spoofing attack detection
RSSI
RSS
Resiliency
resilience
received signal strength
authentication mechanism
physical layer information
Physical layer
packet radio networks
ISM band
heterogeneous wireless networks
heterogeneous wireless devices
frequency 2.4 GHz
CTC schemes
cross-technology communication
Cross Layer Security
composability
Communication system security
collaborative mechanism
biblio
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Submitted by grigby1 on Wed, 05/01/2019 - 10:33am
security
Q-learning based detection scheme
received ambient signal properties
Received signal strength indicator
reinforcement learning technique
resilience
Resiliency
roadside units
rogue edge attacks
rogue edge node
RSSI
RSUs
Scalability
pubcrawl
serving edge
shared ambient radio
signal detection
source media access control address
spoofing detection
telecommunication computing
telecommunication security
test threshold
VANET model
vehicular ad hoc networks
wireless networks
learning (artificial intelligence)
ambient radio signals
authentication
composability
detection error rate reduction
detection scheme
dynamic VANET
edge computing
edge detection
Image edge detection
indoor radio
indoor wireless networks
large-scale network infrastructure
access protocols
learning-based rogue edge detection
MAC address
man-in-the-middle attacks
Metrics
mobile device
Mobile handsets
OBUs
onboard units
optimal detection policy
PHY-layer rogue edge detection scheme
physical-layer rogue edge detection
biblio
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
lightweight sybilfree-APIT algorithm
Metrics
wireless localization schemes
wireless devices
Wireless communication
SF-APIT scheme
SF-APIT
sensor placement
sensor nodes
secure APIT localization scheme
RSSI
received signal strength
range-free method
location-aware applications
localization
telecommunication security
hostile WSN
distributed WSNs
distributed WSN
distributed wireless sensor networks
detection rate
Cryptography
Communication system security
antennas
Peer-to-peer computing
sybil attacks
Global Positioning System
wireless sensor networks
composability
pubcrawl
biblio
Bandwidth Prediction on a WiMAX Network
Submitted by el_wehby on Fri, 05/25/2018 - 2:49pm
Mobile communication
wireless
WiMAX network
WiMax
RSSI
receive signal strength indicator
prediction
next-generation networking technology
next generation networks
Bandwidth
IEEE 802.16 standard
IEEE 802.11 Standards
high-speed network access
Educational institutions
Correlation
CINR
carrier to interference plus noise ratio
bandwidth prediction
1536086
1
2
next ›
last »