Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
VANETs
biblio
Prevention of DoS Attacks by Detection of Multiple Malicious Nodes in VANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Roads
network throughput
packet delivery ratio
Packet detection
packet detection algorithm
packet loss ratio
pubcrawl
resilience
Resiliency
network availability
Safety
Safety messages
Technology management
VANET
VANETs
vehicle nodes
vehicular ad hoc networks
vehicular adhoc network
driver safety
automation
Compositionality
computer network security
critical information
Denial of Service attacks
detection algorithms
DoS attacks
DoS attacks prevention
manet attack prevention
irrelevant data
irrelevant packets
Jamming
malicious nodes
MANET Attack Detection
Metrics
multiple malicious nodes
biblio
Interest Flooding Attack Mitigation in Named Data Networking Based VANETs
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
Scalability
named data networking
NDN
network applications
poisoning cache attack
privacy violation
pubcrawl
resilience
Resiliency
Named Data Network Security
security susceptibilities
storage management
telecommunication network routing
VANETs
vehicular
vehicular ad hoc networks
Vehicular Named Data Network
VNDN
ICN
CCN
computer network security
content distribution
conventional IP based system
data fetching
data privacy
Flooding
Human behavior
Ad Hoc
IFAMS scheme
Information Centric Network
Interest
interest flooding attack mitigation scheme
internet
IP based Internet
IP networks
mobility management
biblio
CUIF: Control of Useless Interests Flooding in Vehicular Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
safety related applications
content name
Control of Useless Interests Flooding
CUIF scheme
data
efficient communication environment
Interest forwarding storm
outgoing Interest packets
Producer vehicle
NDN
traditional host centric approach
vehicle address
Vehicular Ad-hoc Network
vehicular information network technology
Vehicular Named Data Network
Vehicular Named Data networks
VNDN
Named Data Network Security
Roads
Scalability
Servers
security
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
IP networks
VANETs
vehicular ad hoc networks
internet
VANET
Interest
named data networks
vehicular
biblio
Partial Signature for Cooperative Intelligent Transport Systems
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
security
Scalability
Resiliency
Human behavior
pubcrawl
VANETs
Metrics
PKI Trust Models
authenticity.
C-ITS
biblio
A Secure Blockchain-Based Group Mobility Management Scheme in VANETs
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
Security analysis
Protocols
pubcrawl
resilience
Resiliency
Safe Coding
safe transportation
secure blockchain-based group mobility management scheme
secure group mobility management scheme
security
policy-based governance
security functionalities
significant overload
smooth handovers
telecommunication security
VANET
VANETs
vehicular ad hoc networks
Vehicular Ad-hoc Network
high mobility
blockchain
collaboration
Distributed Mobility Management
distributed mobility management protocol
DMM solutions
frequent handovers
group communication scenario
Handover
handover authentication
authentication
Human behavior
Human Factors
message authentication
Metrics
mobility management (mobile radio)
network architecture
network entities
next generation mobile network
biblio
Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
smart contracts
Repudiation
verifying party
vehicular networks
VANETs
trustworthy nodes
trusted centralized party
smart contract-based approach
reputable trusted node
IPFS
greedy authenticated nodes
computed reputation rating
reputation
MatLab simulation
File systems
digital signatures
traffic engineering computing
trust
Mathematical model
blockchain
Metrics
Peer-to-peer computing
Protocols
composability
pubcrawl
Human behavior
Resiliency
Trusted Computing
security
data integrity
data privacy
biblio
Improved Detection and Mitigation of DDoS Attack in Vehicular ad hoc Network
Submitted by aekwall on Wed, 12/18/2019 - 2:23pm
routing overhead
DDoS attack mitigation
vehicular ad hoc network
VANETs Security
NS-2
network packet loss
network environment
mobile ad hoc networks
greedy approach
distributed denial of service attacks
attack topology
DDoS Attack
resilience
Attack detection
telecommunication network topology
attack mitigation
network throughput
Throughput
Measurement
telecommunication network routing
Metrics
vehicular ad hoc networks
VANETs
Routing
composability
pubcrawl
Human behavior
DDoS Attacks
computer network security
Computer crime
biblio
Hybrid Approach for Congestion Control in VANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Compositionality
Congestion Control
MANET
MANET security
Metrics
pubcrawl
quality of service
resilience
Resiliency
Safety messages
VANETs
biblio
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
Sybil security threat
packet delivery time synchronization
probability of detection
pseudocode algorithm
roadside unit
Routing
Spider monkey time synchronization (SMTS)
spider-monkey time synchronization technique
Sybil attack detection
Sybil attacking strategies
natural spider-monkey behavior
synchronisation
Synchronization
telecommunication power management
time division multiple access
unintended vehicles
VANETs
vehicular ad hoc networks
vehicular collisions
Metrics
destination vehicles
telecommunication security
security
Protocols
pubcrawl
composability
sybil attacks
artificial spider-monkey technique
biology
densely deployed challenge zone
security of data
dynamic VANET system
energy conservation
energy-efficient time synchronization
erroneous messages
legitimate vehicles
malicious nodes
metaheuristic stimulated framework approach
minimized energy consumption
multiple identities
biblio
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
sybil attacks
Peer-to-peer computing
protocol scheme
pubcrawl
Resiliency
road side units
Roads
RSU
Sybil attack prevention
mobile computing
symmetric key encryption
symmetric keys
telecommunication security
VANET
VANETs
vehicular ad hoc networks
vehicular networks
Identity management
ad-hoc networks
AES
authentication
CA
certification authority
Compositionality
Cryptographic Protocols
encryption
Ad Hoc Network Security
identity symmetric scheme
inter-communication
ITS
lightweight approach
malicious vehicle
Metrics
mobile ad hoc networks
« first
‹ previous
1
2
3
next ›
last »