Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
packet radio networks
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
biblio
Packet Length Covert Channel: A Detection Scheme
Submitted by grigby1 on Thu, 09/05/2019 - 10:24am
Scalability
packet length covert channel
packet radio networks
packet size covert channel
Prevention
Protocols
Receivers
Reliability
resilience
normal terrific
security
security attack
system security policies
telecommunication channels
telecommunication security
telecommunication traffic
undetectable network covert channels
elimination
Communication channels
Compositionality
content development
content-based features
covert channel
covert channels
covert traffic
detection
communication channel
feature extraction
frequency-based features
illegal information flow
learning (artificial intelligence)
machine learning
machine learning based detection scheme
network protocols
biblio
Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication
Submitted by grigby1 on Mon, 08/26/2019 - 10:10am
pubcrawl
ZigBee packets
Zigbee
wireless sensor networks
wireless networks
wireless LAN
Wireless fidelity
Wi-Fi devices
telecommunication security
spoofing attack detection
RSSI
RSS
Resiliency
resilience
received signal strength
authentication mechanism
physical layer information
Physical layer
packet radio networks
ISM band
heterogeneous wireless networks
heterogeneous wireless devices
frequency 2.4 GHz
CTC schemes
cross-technology communication
Cross Layer Security
composability
Communication system security
collaborative mechanism
biblio
Evaluation and analysis of network coding at network layer
Submitted by grigby1 on Mon, 06/11/2018 - 2:34pm
network topologies
XOR technique
wireless networks
Throughput
telecommunication network topology
Resiliency
resilience
real time performance metrics
pubcrawl
packet radio networks
packet delivery rate
composability
network layer
network coding
Metrics
end-to-end delay
encoding
delays
delay
Decoding
data communication
biblio
Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
Submitted by grigby1 on Thu, 05/24/2018 - 11:30am
power system faults
message spoofing attacks
Metrics
packet radio networks
power engineering computing
power grid efficiency
power grid system
power grid vulnerability analysis
power grids
internet
power system reliability
power system security
pubcrawl
resilience
Resiliency
SCADA
SCADA systems
security of data
cyber-attacks
Base stations
Cascading Failures
cellular radio
complex CPPS
complex cyber physical power system
composability
Compositionality
Cyber Attacks
authentication
Cyber-physical power system (CPPS)
DoS attacks
DTU
general packet radio service
GPRS
GPRS-based SCADA systems
Ground penetrating radar
IEEE 9-node system
biblio
An Accumulated Loss Recovery Algorithm on Overlay Multicast System Using Fountain Codes
Submitted by BrandonB on Wed, 05/06/2015 - 1:53pm
accumulate loss recovery algorithm
Decoding
delay reduction
delays
encoding
error correction codes
Fountain codes
multicast communication
overlay multicast system
overlay multicast tree
overlay networks
Packet loss
packet loss decoding
packet radio networks
simulation
trees (mathematics)
biblio
A temporal packet marking detection scheme against MIRA attack in MANET
Submitted by BrandonB on Wed, 05/06/2015 - 1:07pm
packet marking
Topology
time behavior
Throughput
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing
resource constraint
physical security
packet transmission
packet radio networks
packet marking detection scheme
clustering
mobile ad-hoc network
mobile ad hoc networks
Misleading routing attack (MIRA)
misleading routing attack
MIRA attack
MANET
malicious nodes detection
IP networks
energy constraint operations
dynamic topology
delays
delay packet
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 7:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet
biblio
A Cross-layer Based Packet Scheduling Scheme for Multimedia Traffic in Satellite LTE Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:28am
mobile services
Throughput
terrestrial counterpart
telecommunication traffic
Scheduling algorithms
Satellites
satellite LTE network
satellite LTE air interface
Satellite broadcasting
quality of service
packet radio networks
multimedia traffic QoS demands
Multimedia communication
artificial satellites
mobile satellite communication
MIMO technology
MIMO communication
MIMO
Long Term Evolution
land mobile radio
land mobile dual-polarized GEO satellite system
global coverage
delays
cross-layer based queue-aware scheduler
cross-layer based packet scheduling algorithm
CBQA scheduler