Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sybil attacks
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
biblio
SDN-based Misbehavior Detection System for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
sybil attacks
vehicular privacy standards
Sybil attack-resistant
Software-Defined Networking paradigm
SDN-based misbehavior Detection system
misbehavior detection systems
Misbehaving Detection Systems
cryptography solutions
context-aware MDS
voting
internal attacks
vehicular networks
Software Defined Networks
standards
computer network security
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Resiliency
software defined networking
Software
security
data privacy
Cryptography
Monitoring
biblio
A Truth-Inducing Sybil Resistant Decentralized Blockchain Oracle
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
Cryptography
Resiliency
pubcrawl
composability
sybil attacks
Metrics
Distributed databases
decentralized oracle protocols
Decentralized Oracles
majority-voting schemes
maximized expected score
nonlinear stake scaling rule
Peer Prediction
peer prediction scoring scheme
Staked Voting
truth-inducing Sybil resistant decentralized blockchain oracle
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by aekwall on Mon, 12/14/2020 - 11:43am
dynamic spectrum access
Tsunami
Truthful user Sybil-proof aUctioN mechAnisM
Sybil-proof spectrum auction mechanisms
spectrum shortage problem
spectrum allocation efficiency
single secondary user
sequential matching approach
primary user Sybil-proof aUctioN mechAnisM
online spectrum auction
onlIne spectrum allocation
cost-efficient SUs
bid-independent sorting method
2D truthfulness
Resiliency
Cost accounting
DSA
electronic commerce
Resists
radio networks
Interference
Metrics
Wireless communication
resource management
sybil attacks
composability
pubcrawl
biblio
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation
Submitted by aekwall on Mon, 12/14/2020 - 11:43am
Sybil attack detection
radio links
radiofrequency identification
Resiliency
rich multipath features
Robot kinematics
Robot sensing systems
robotic collaboration
ScatterID actively manipulates multipath propagation
single-antenna robot
pubcrawl
Sybil attackers
sybil attacks
telecommunication security
Trajectory
Wireless communication
wireless LAN
wireless medium
wireless networking
wireless sensor networks
fine-grained physical layer signatures
backscatter
batteryless backscatter tags
bulky multiantenna systems
collaboration
collaborative tasks
composability
computer network security
featherlight backscatter tags
fictitious robots
Robot Trust
fundamental trust assumption
lightweight Sybil-resilient multirobot networks
lightweight system
Metrics
miniaturized robots
mobile robots
Multi-robot network
multi-robot systems
multipath manipulation
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
Trajectory
vehicular communications
vehicular ad hoc network
trusted third party authorities
Sybil attack detection scheme
safety-related services
multistep verification process
multiple forged identities
deep learning based object detection technique
Advanced Driving Assistant System
ADAS sensors
V2V
Laser radar
driver information systems
Sensor Systems
Autonomous Driving
road safety
object detection
sensors
VANET
telecommunication computing
sybil attacks
Metrics
vehicular ad hoc networks
Global Positioning System
Sybil attack
composability
pubcrawl
Resiliency
learning (artificial intelligence)
telecommunication security
biblio
An Intelligent Mechanism for Sybil Attacks Detection in VANETs
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
telecommunication computing
user privacy information
SyDVELM mechanism
Sybil Attacks.
fixed road-side components
Extreme Machine Learning
extreme learning machine
Acceleration
Scalability
distributed network
telecommunication network topology
Complexity theory
feedforward neural nets
VANET
data privacy
machine learning
sybil attacks
Metrics
vehicular ad hoc networks
VANETs
Sybil attack detection
privacy
composability
pubcrawl
Resiliency
security
data integrity
telecommunication security
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »