Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data forwarding
biblio
A Collaborative Multi-Metric Interface Ranking Scheme for Named Data Networks
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
Weight measurement
Named-Data Networking (NDN)
multimetric robust interface ranking scheme
minimum network delay
maximum satisfaction rate
Interface ranking
forwarding interface modes
Data messages
data forwarding
Content-Centric Networking (CCN)
content sharing
collaborative multimetric interface ranking scheme
content name
Scalability
NDN
named data networking
delays
collaboration
Routing protocols
Mathematical model
internet
Routing
pubcrawl
Human behavior
Resiliency
biblio
File Encryption and Decryption Using DNA Technology
Submitted by aekwall on Mon, 02/08/2021 - 1:50pm
deoxyribo nucleic acid sequence
arbitrary keys generation
authorized persons
binary-coded form
common key
cryptographic process
data forwarding
data hijacking
data transmutation
appropriate form
DNA technology
file decryption
file encryption
intermediate steps
original texted message
unknown form
users data security
Cryptography
DNA sequence
DNA cryptography
decryption
encoding
data hiding
Predictive Metrics
public key cryptography
DNA
privacy
pubcrawl
Human behavior
Resiliency
Receivers
Conferences
encryption
biblio
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:10am
malware
wireless links
service requests
quadratic growth
Peer-to-peer computing
node mobility
network bandwidth
mobility range
mobile services
mobile nodes
mobile networks
mobile malware
mobile computing
mobile botnets
botnet propagation storms
last chipper time
invasive software
Internet botnets
internet
exponential growth
epidemic modeling
distributed mechanism
denial-of-service impact
data forwarding
coordinated attacks
computer network security
compromised nodes