Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
end-to-end delay
biblio
Detection and Prevention of Blackhole Node
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
mobile computing
Topology
Throughput
Routing protocols
Routing
Resiliency
resilience
R-AODV
pubcrawl
Packet drop ratio (PDR)
NS-2.35
manet attack prevention
Metrics
MANET Attack Detection
end-to-end delay
encryption
Elliptic curve cryptography
ECC
Compositionality
Blackhole attack
Ad hoc networks
biblio
Improving the Packet Delivery Reliability and Privacy Protection in Monitoring Wireless Networks
Submitted by grigby1 on Tue, 08/17/2021 - 4:32pm
Protocols
wireless sensor networks
Wireless Sensor Network
wireless networks
source location privacy
Routing Protocol
Routing
Resiliency
resilience
Reliability
pubcrawl
Compositionality
privacy
Position measurement
packet delivery ratio
Monitoring
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
end-to-end delay
biblio
Intellectual Priority-based Low Latency Data Delivery Scheme for Multi-interface and Multi-channel Devices in Multi-hop Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:43pm
spread spectrum communication
Wireless Mesh Network Security
wireless-mesh-network
relaying hops
real-time-scheduling
multiinterface devices
multihop wireless mesh networks
multichannel devices
multi-interface
low-latency
intellectual priority-based packet transmission scheme
intellectual priority-based low latency data delivery scheme
end-to-end delay
telecommunication security
relay networks (telecommunication)
wireless mesh networks
delays
telecommunication network routing
machine learning
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
Support vector machines
real-time systems
biblio
EMPTCP: An ECN Based Approach to Detect Shared Bottleneck in MPTCP
Submitted by grigby1 on Wed, 12/02/2020 - 2:03pm
Protocols
transport protocols
telecommunication congestion control
Synchronization
Switches
subflows
shared bottleneck detection scheme
Scalability
Resiliency
resilience
real-time systems
real time protocol
real time networks
pubcrawl
Bandwidth
network efficiency
multiple bottleneck scenario
Multimedia communication
MPTCP sender
lightweight yet accurate approach
enhanced MPTCP protocols
end-to-end delay
EMPTCP
ECN scheme
delays
coupled congestion control
computer networks
bottleneck link
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 10:57am
Loss measurement
Packet loss rate
ns-3 network simulator
network performance parameters
mobile nodes
mobile multihop network
MANET security measurement
internal attacks
intermediate nodes
end-to-end delay
blackhole nodes
blackhole attack feature extraction
Blackhole attack
AODV
AODV protocol
external attacks
IoT
mobile ad hoc network
Throughput
mobile ad hoc networks
MANET
network security
ns-3
Routing
Routing protocols
pubcrawl
Resiliency
feature extraction
security
telecommunication security
Internet-of-Things
Scalability
biblio
Distributed SDN-Based C4ISR Communications: A Delay-Tolerant Network for Trusted Tactical Cloudlets
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
software defined networking
Mobile Edge Computing
Network reconnaissance
network resource allocation
pubcrawl
realistic tactical scenarios
resource allocation
resource management
SDN architecture
short message service
mobile computing
software-defined radio networking
Tactical cloudlets
tactical environments
tactical SMS
tactical traffic flow
telecommunication traffic
trusted tactical cloudlets
trusted third-part authority
unmanned vehicle patrol deployment
distributed SDN-based C4ISR communications
centralized SDN controller
Cloud Computing
computerized-command-control-communications-intelligence- surveillance reconnaissance infrastructure
decentralized cloudlets layer
decentralized MEC layer
Delay-Tolerant Network
delays
distributed cloudlets
distributed SDN
C4ISR
end-to-end delay
generation military environment
high bite rate ISR
Information systems
intelligence-surveillance-reconnaissance video
MEC
military communication
military computing
biblio
Performance Evaluation of the Geographic Routing Protocols Scalability
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
pubcrawl
WSN
wireless sensor networks
traffic rates
telecommunication traffic
telecommunication security
telecommunication network topology
SRGBR
SRBGR protocol
sensors
security scalability
Secure Region Based Geographic Routing
Scalability
Routing protocols
Routing
Compositionality
network topology
network density scenarios
network densities
Meters
high density network scenarios
geographic routing protocols scalability
geographic routing approach
geographic routing
end-to-end delay performance metric
end-to-end delay
Dynamic Window Secure Implicit Geographic Forwarding
DWSIGF protocol
DWSIGF
delays
biblio
Evaluation and analysis of network coding at network layer
Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
network topologies
XOR technique
wireless networks
Throughput
telecommunication network topology
Resiliency
resilience
real time performance metrics
pubcrawl
packet radio networks
packet delivery rate
composability
network layer
network coding
Metrics
end-to-end delay
encoding
delays
delay
Decoding
data communication
biblio
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Observers
uncertainty handling
uncertain reasoning
trust management scheme
Trust management
telecommunication security
telecommunication network topology
telecommunication computing
security vulnerabilities
security enhancements
security
Routing
planning (artificial intelligence)
PDR improvement
packet delivery ratio
open wireless medium
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
MANET
indirect observation
end-to-end delay
dynamic topology
DST method
direct observation
Dempster-Shafer Theory
cognition
Bayesian inference
Bayes methods
artificial intelligence community
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing