Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
6LoWPAN
biblio
LPA-SDP: A Lightweight Privacy-Aware Service Discovery Protocol for IoT Environments
Submitted by aekwall on Mon, 12/21/2020 - 12:27pm
service discovery
ubiquitous data access
resource-constrained environments
resource discovery protocols
resource directory
privacy consideration
manual discovery
LPA-SDT
LPA-SDP
lightweight privacy-aware service discovery protocol
IoT deployments
battlefields
Resiliency
IoT
CoAP
resource-constrained devices
IoT environments
ubiquitous computing
Healthcare
6LoWPAN
privacy
Protocols
composability
pubcrawl
Internet of Things
data privacy
biblio
Real Time DDoS Intrusion Detection and Monitoring Framework in 6LoWPAN for Internet of Things
Submitted by aekwall on Mon, 12/21/2020 - 12:27pm
DDoS
Internet of Things
security
pubcrawl
composability
6LoWPAN
sensors
Resiliency
Contiki
biblio
Performance Evaluation of a Wormhole Detection Method using Round-Trip Times and Hop Counts in RPL-Based 6LoWPAN Networks
Submitted by aekwall on Mon, 12/21/2020 - 12:27pm
Intrusion Detection
RPL
pubcrawl
composability
6LoWPAN
Internet of Things
wormhole attack
Resiliency
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
radio links
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
IP networks
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
AES
Resiliency
composability
Metrics
policy-based governance
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
ipv6 security
Ciphers
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
biblio
Investigation on 6LoWPAN Data Security for Internet of Things
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
Data Security
wireless sensor networks
Wireless communication
security
Routing protocols
pubcrawl
IoT security
Internet of Things (IoT)
Internet of Things
ipv6 security
Communication system security
authentication
6LoWPAN
policy-based governance
Metrics
composability
Resiliency
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
IoT environment
topological isolation
smoothing methods
low power and lossy network
IPv6 routing protocol over LLN
IPv6 over low power personal area network
Internet of things environment
high performance computing environment
forecasting
exponential window function
exponential smoothing time series data
exponential smoothing
blackhole attack detection approach
Blackhole attack
personal area networks
time series
IoT
blackhole attacks
telecommunication network topology
sensors
RFID
sink node
6LoWPAN
internet
Routing
Routing protocols
pubcrawl
Resiliency
Internet of Things
Scalability
IP networks
RPL
biblio
Context-Aware Trust Management System for IoT Applications with Multiple Domains
Submitted by aekwall on Mon, 01/13/2020 - 11:06am
reputation systems
context-aware trust management system
context-aware trust model
context-aware trust models
context-based trust evaluation
distributed resource-constrained IoT devices
heterogeneous devices
lightweight IoT devices
reputation system
Context-Aware Trust Evaluation
service provider
smart wildlife
Traffic Management
Trust Management System
trust values
trustworthiness record
Wildlife
IoT
Context modeling
context items
context information
Base stations
Trust management
ubiquitous computing
6LoWPAN
composability
pubcrawl
Resiliency
Trusted Computing
performance evaluation
IoT applications
Internet of Things
computer network security
biblio
ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
Submitted by aekwall on Mon, 01/13/2020 - 11:06am
local repair attacks
bagged trees
boosted trees
classifier validation methods
ELNIDS
Ensemble Learning
ensemble learning based network intrusion detection system
global connectivity
heterogeneous smart devices
IPv6 Routing Protocol
lossy networks
NIDS
RPL based Internet of Things
RPL-NIDDS17 dataset
RUSBoosted trees
smart devices
subspace discriminant method
RPL
intrusion detection model
wireless networks
classification
routing attacks
Intrusion Detection
6LoWPAN
Vegetation
Routing
Routing protocols
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Internet of Things
security of data
biblio
Graphical User Interface for OpenThread
Submitted by aekwall on Mon, 01/13/2020 - 11:05am
graphical user interfaces
Threadgroup
Thread protocol
TCL/TK
OpenThread
Message systems
IPv6
Instruction sets
IEEE 802.15.4
IoT
6LoWPAN
Routing protocols
Peer-to-peer computing
composability
pubcrawl
Resiliency
Internet of Things
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »