Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IEEE 802.11 Standard
biblio
Multi-Attack Detection Using Forensics and Neural Network Based Prevention for Secure MANETs
Submitted by grigby1 on Tue, 09/21/2021 - 2:35pm
MANET Attack Detection
telecommunication traffic
Routing
Resiliency
resilience
pubcrawl
Probes
neural network
Multi attacker
Metrics
manet attack prevention
MANET
IEEE 802.11 Standard
Fuzzy logic
Forensics
Forensic method
Ethernet
detection
delays
Compositionality
biblio
Security Analysis and Prevention of Attacks on IoT Devices
Submitted by grigby1 on Wed, 09/08/2021 - 8:33am
Logic gates
Wireless fidelity
tools
smart devices
Resiliency
resilience
pubcrawl
Pins
NodeMCU
Metrics
Arduino IDE
IoT devices
IEEE 802.11 Standard
Human behavior
home security
DoS Attack Prevention
DHT11 Sensor.
DDoS Attack Prevention
Computer crime
composability
biblio
Self-Healing Solutions for Wi-Fi Networks to Provide Seamless Handover
Submitted by grigby1 on Mon, 02/17/2020 - 4:12pm
quality of service
wireless LAN
wireless channels
wireless channel
Wi-Fi Networks
uniform seamless network quality of service
unexpected network faults
SON developments
self-organizing network paradigm
self-healing solutions
self-healing networks
seamless handover
Resiliency
resilience
Cellular networks
QoS
pubcrawl
Packet loss
mobility management (mobile radio)
ML algorithms
machine learning algorithms
learning (artificial intelligence)
IEEE 802.11 Standard
Handover
fault tolerant computing
fault diagnosis
composability
cellular radio
biblio
Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 1:06pm
school campus networks
packet transmission
participating nodes
Peer-to-peer computing
pubcrawl
resilience
Routing
routing nodes
Routing Protocol
Routing protocols
packet delivery ratio
service coverage
telecommunication security
transmitted data packets
ubiquitous wireless networks
wireless mesh network
wireless mesh networks
wireless sensor networks
WMNs
influential factors
AODV
black hole
Black hole attack
community networking
composability
emergency rescue operations
home automation
IEEE 802.11 Standard
Ad hoc networks
Malicious Packet Drop
malicious packet drop attack
Metrics
multihop destination
network maintenance
network performance reliability
NS-3 simulator
office automation
biblio
CodeRepair: PHY-layer partial packet recovery without the pain
Submitted by el_wehby on Fri, 05/25/2018 - 2:49pm
lossy 802.11 links
wireless LAN
single parity code
Reflective binary codes
Receivers
Protocols
practical coding-based protocol
PHY layer
partially corrupted packets
parity check codes
padded parities
packet recovery approaches
OFDM
802.11 networks
IEEE 802.11 Standard
forward error correction
Error Recovery
error correction
error correcting capability
erroneous coded bits
end-to-end link goodput
Decoding
Convolutional codes
convolutional code
CodeRepair
coded bit errors
1536086
biblio
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy
Submitted by el_wehby on Fri, 05/25/2018 - 2:47pm
Power demand
wireless LAN
WiFi energy consumption
WiFi broadcast frames
Unicast
trace-driven simulation
telecommunication traffic
telecommunication power management
suspend mode
smartphone energy saving
smart phones
Protocols
AP-assisted broadcast traffic management
Ports (Computers)
packet round-trip time
Nexus One
network capacity
IEEE 802.11 Standard
high power active mode
HIDE system
energy consumption
energy conservation
computer network management
Central Processing Unit
1536086
biblio
Efficient Probing of Heterogeneous IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
intrusion protection system
software heterogeneity
Servers
security
Resiliency
resilience
pubcrawl
Protocols
Probes
personal area networks
network technology
network security
Network scans
network scan
IoT devices
IoT
6LoWPAN
Internet of Things
internet
interconnectivity
IEEE 802.15 Standard
IEEE 802.11 Standard
heterogeneous IoT networks
hardware heterogeneity
Fingerprinting
Cyber Physical Systems Security
computer network security
composability
complex security protocols
Bandwidth
active network measurements
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 12:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
A Graph-Theoretic Approach to Virtual Access Point Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 1:04pm
Correlation
security standpoint
standardization process
telecommunication network management
Resiliency
secure network
security
VAP identification algorithm
virtual access point correlation
wireless LAN
wireless networks
802.11 access point implementation
Communication system security
computer network security
pubcrawl
functional improvement
graph theory
graph-theoretic approach
IEEE 802.11 Standard
individual provider
insecure network
logically separate networks
nascent wireless functionality management
Network reconnaissance
network topology
physical equipment
Probes
1
2
next ›
last »