Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RSSI
biblio
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
Transportation Systems
Spectrogram
speech processing
Sybil attack
Sybil attack detection method
sybil attacks
testing
Time series analysis
traffic engineering computing
RSSI time series
V2I communications
V2V communications
VANET
vehicle-to-infrastructure communications
vehicle-to-vehicle communications
vehicular ad hoc networks
vehicular speech
Voiceprint
pubcrawl
computer network security
Dynamic Time Warping
Intelligent Transportation Systems
Metrics
mobile computing
Peer-to-peer computing
position estimation
Position measurement
composability
Radio propagation
radio propagation models
Received signal strength indicator
Receivers
Resiliency
road safety
RSSI
biblio
INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
Observers
vehicular ad hoc networks
VANET traffic safety
VANET Security
telecommunication security
sybil attacks
sybil attack detection mechanism
Sybil attack detection
Safety
RSSI-based localization technique
RSSI
road traffic
Resiliency
Radio propagation
pubcrawl
automobiles
Metrics
Location Accuracy
localization techniques
localization
INTERLOC
interference-aware RSSI-based localization
interference (signal)
Interference
inter-vehicular communications
heterogeneous interference
GPS
Global Positioning System
composability
biblio
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
Resiliency
probability
PU
PU-PUE
pubcrawl
PUE attacker
PUE position
received signal strength indication
Received signal strength indicator
primary user emulation attack localization
risk management
RSSI
telecommunication security
Trilateration
trilateration technique
uncertainty
wireless sensor networks
Bayes methods
Primary user Emulation
physical network layer coding
network coding
lost function
licensed channel
DoS attack
deny-of-service attack
decision theory
conditional probability
Cognitive Radio Security
cognitive radio networks
cognitive radio
Channel estimation
Bayesian decision theory
Bayesian decision model
biblio
Privacy-preserving channel access using blindfolded packet transmissions
Submitted by BrandonB on Mon, 05/04/2015 - 2:12pm
Mica2 hardware
wireless sensor networks
wireless MAC-layer approach
wireless channels
Tinyos-2x test-bed implementation
time division multiple access
TDMA
RSSI
protocol
privacy-preserving channel access anonymity
privacy
periodic TDMA-Iike time-slot
Noise
add-on hardware module
MAC protocols
Interference
Heating
Google
Equations
data privacy
Cryptography
convergence
channel sensing strategy
blindfolded packet transmission
anonymity
« first
‹ previous
1
2