Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
delay tolerant networks
biblio
Security Embedded Offloading Requirements for IoT-Fog Paradigm
Submitted by aekwall on Mon, 01/20/2020 - 10:53am
IoT-Fog based systems
Task Offloading
security provision
security embedded task offloading requirements
security embedded offloading requirements
Scalability
resource allocation
Resiliency
pubcrawl
propagation latencies
offloading security
middleware technologies
middleware
Middle-ware
IoT-Fog paradigm
Cloud Computing
IoT-Fog based future communication networks
Internet of Things (IoT)
Internet of Things
internet
information processing
future smart networks
Fog Computing and Security
Fog computing
embedded security requirements
edge computing
delay tolerant networks
Data protection
data management
computer network security
biblio
Establishing Trust by Detecting Malicious Nodes in Delay Tolerant Network
Submitted by aekwall on Mon, 03/11/2019 - 9:36am
selfish behavior
Probabilistic logic
probabilistic misbehavior detection scheme
probability
pubcrawl
Punishment
Resiliency
Routing
Scalability
probabilistic checking
Selfish node
Task Analysis
telecommunication network routing
telecommunication security
trust
Trust Routing
trusted authority
Trusted Computing
game theory analysis
compensation
composability
Conferences
delay tolerant network
delay tolerant networks
DTN
dynamic probabilistic inspection
game theory
Ad hoc networks
History
Inspection
malicious nodes
Market research
MAXTRUST scheme
Misbehavior detection
misbehavior nodes
mobile radio
biblio
A trust-based security enforcement in disruption-tolerant networks
Submitted by grigby1 on Thu, 08/23/2018 - 10:44am
security enforcement
mobile computing
network participants
Peer-to-peer computing
privacy
pubcrawl
Routing protocols
security
security credentials
Medical services
security of data
subjective logic
telecommunication security
trust model
trust-based security enforcement
Trusted Computing
uncertainty
web of trust
delay tolerant networks
authentication
authorisation
central trusted entity
centralised trusted authorities
composability
Compositionality
computational intelligence
Cryptography
attribute-based access control
Delay-tolerant networks
delays
disruption- and delay-tolerant networks
disruption-tolerant networks
DTN
high packet drop rates
long delays
biblio
\#x003BC;DTNSec: A Security Layer for Disruption-Tolerant Networks on Microcontrollers
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
resilience
Metrics
microcontrollers
payload size
Payloads
performance evaluation
Protocols
pubcrawl
public key cryptography
man-in-the-middle attacks
Resiliency
Routing
secp128r1
secp192r1
secp256r1
security layer
store-carry-forward principle
μDTNSec
digital signatures
Asymmetric Encryption
asymmetric signatures
bundle protocol specification
Compositionality
Contiki OS
Cryptographic Protocols
delay tolerant networks
delay-disruption-tolerant networks
advanced encryption standard
disruption-tolerant networks
Elliptic curve cryptography
encryption
energy measurement
energy measurements
energy-constrained devices
hardware-backed symmetric encryption
Human behavior
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
biblio
Behavioral Malware Detection in Delay Tolerant Networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:33am
DTN model
Silicon
short-range communication technologies
proximity malware
polymorphic malware
obfuscated malware
naive Bayesian model
modern mobile consumer electronics
mobile radio
Mathematical model
malware
invasive software
filtering theory
Equations
adaptive look ahead
dogmatic filtering
delay-tolerant-network model
Delay-tolerant networks
delay tolerant networks
Bluetooth
behavioral malware characterization
behavioral characterization
Bayesian methods
Bayesian malware detection
Bayesian filtering
Bayes methods
aging
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 7:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet