Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
V2V
biblio
Overview Of Vanet Network Security
Submitted by grigby1 on Fri, 08/25/2023 - 10:34am
VANET
vehicular
V2I.
Human Factors
black hole
quality assurance
mathematical models
V2V
IoV
information science
Trajectory
vehicular ad hoc networks
Compositionality
information security
network security
composability
Information Assurance
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Integrity and Authentications for service security in vehicular ad hoc networks (VANETs): A Review
Submitted by grigby1 on Tue, 02/08/2022 - 11:40am
Compositionality
RSU
open access
V2V
integrity
manet privacy
human computer interaction
vehicular ad hoc networks
uncertainty
security
VANETs
composability
privacy
authentication
Resiliency
resilience
Metrics
pubcrawl
biblio
A Scalable Mobile Multi-Node Channel Sounder
Submitted by grigby1 on Wed, 05/05/2021 - 12:24pm
5G
channel sounding
multi-node
pubcrawl
Scalability
Scalable Security
V2V
wireless
biblio
A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Trajectory
vehicular communications
vehicular ad hoc network
trusted third party authorities
Sybil attack detection scheme
safety-related services
multistep verification process
multiple forged identities
deep learning based object detection technique
Advanced Driving Assistant System
ADAS sensors
V2V
Laser radar
driver information systems
Sensor Systems
Autonomous Driving
road safety
object detection
sensors
VANET
telecommunication computing
sybil attacks
Metrics
vehicular ad hoc networks
Global Positioning System
Sybil attack
composability
pubcrawl
Resiliency
learning (artificial intelligence)
telecommunication security
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
biblio
Analysis of Realistic Attack Scenarios in Vehicle Ad-Hoc Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
resilience
vehicular ad hoc networks
vehicle connectivity
vehicle ad-hoc networks
VANET
V2V
unprecedented security concerns
telecommunication security
technological development
sybil nodes
sybil attacks
Sybil attack
security countermeasures
security
Resiliency
advanced attacks
replay attack
realistic attack scenarios
pubcrawl
OMNeT++ simulation environment
OMNET++
Metrics
inter-vehicular communication
Driver assistance systems
disruptive innovations
composability
common attacks
Autonomous Driving
automotive transportation
attacks
file
Anytime Visual Scene Understanding for Heterogenous and Distributed CPS
Submitted by Srinivasa Narasimhan on Thu, 01/09/2020 - 6:10pm. Contributors:
Srinivas Narasimhan
Martial Herbert
Christoph Mertz
James Hoe
cooperative scene understanding
computer vision
V2V
V2I
V2X
machine learning
Posters
1446601
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Justification Based Reasoning in Dynamic Conflict Resolution
Submitted by willirn1 on Wed, 08/21/2019 - 12:25pm
causation
dynamic conflict resolution
Explanations
formal reasoning
Justification based reasoning
responsibility
Traffic
traffic scenarios
V2V
vehicle to vehicle communications
biblio
Security issues in fog computing using vehicular cloud
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Scalability
Vehicular cloud
vehicular ad hoc networks
VANET Cloud
VANET
V2V
V2I
Traffic Safety
security issues
security
authentication
Resiliency
pubcrawl
I2V
Fog computing
edge computing
delays
data privacy
computer architecture
Cloud Computing
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
1
2
next ›
last »