Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sybil attacks
biblio
An Efficient and Secure Directed Diffusion in Industrial Wireless Sensor Networks
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
pubcrawl
composability
directed diffusion
iwsns
node compromise
pairing
Sinkhole attack
Sybil attack
sybil attacks
Metrics
biblio
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
sybil attacks
Peer-to-peer computing
protocol scheme
pubcrawl
Resiliency
road side units
Roads
RSU
Sybil attack prevention
mobile computing
symmetric key encryption
symmetric keys
telecommunication security
VANET
VANETs
vehicular ad hoc networks
vehicular networks
Identity management
ad-hoc networks
AES
authentication
CA
certification authority
Compositionality
Cryptographic Protocols
encryption
Ad Hoc Network Security
identity symmetric scheme
inter-communication
ITS
lightweight approach
malicious vehicle
Metrics
mobile ad hoc networks
biblio
k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Submitted by K_Hooper on Wed, 05/02/2018 - 9:42am
Symmetric matrices
pubcrawl
Resiliency
road vehicles
runtime complexity optimization
Sybil attack
Sybil attack detection
Sybil attack vulnerability
sybil attacks
pseudonymous based privacy protection mechanism
traffic engineering computing
Transmitters
vehicle classification
Vehicle Driving Pattern
vehicle location privacy
vehicular network
vehicular networking
wireless sensor networks
Intrusion Detection
composability
computational complexity
data privacy
driving pattern similarity
Eigenvalues and eigenfunctions
ETSI
IEEE
Intelligent Transportation Systems
Ad hoc networks
k-nearest neighbours classification
kNN classification algorithm
machine learning
Metrics
pattern classification
Peer-to-peer computing
privacy
biblio
Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks
Submitted by K_Hooper on Wed, 05/02/2018 - 9:42am
Safety
vehicular networks
vehicular ad hoc networks
Vehicle driving
sybil attacks
SVM kernel functions based classifiers
Support vector machines
support vector machine based Sybil attack detection method
SUMO simulator
security of data
security
Ad hoc networks
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
learning (artificial intelligence)
Eigenvalues and eigenfunctions
driving pattern matrices
DPM
composability
biblio
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
Transportation Systems
Spectrogram
speech processing
Sybil attack
Sybil attack detection method
sybil attacks
testing
Time series analysis
traffic engineering computing
RSSI time series
V2I communications
V2V communications
VANET
vehicle-to-infrastructure communications
vehicle-to-vehicle communications
vehicular ad hoc networks
vehicular speech
Voiceprint
pubcrawl
computer network security
Dynamic Time Warping
Intelligent Transportation Systems
Metrics
mobile computing
Peer-to-peer computing
position estimation
Position measurement
composability
Radio propagation
radio propagation models
Received signal strength indicator
Receivers
Resiliency
road safety
RSSI
biblio
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
lattice assumption
Wearable devices
sybil attacks
Resiliency
pubcrawl
patients health data
patient treatment
patient diagnosis
mobile healthcare networks analytics
mobile computing
MHN
Metrics
medical information systems
medical histories
ABS
identity privacy
health services
health care
fine-grained authentication scheme
Fiat-Shamir framework
disease treatment
disease diagnosis
digital signatures
data privacy
data analysis
composability
attribute-based signature
anonymous anti-sybil attack protocol
biblio
INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
Observers
vehicular ad hoc networks
VANET traffic safety
VANET Security
telecommunication security
sybil attacks
sybil attack detection mechanism
Sybil attack detection
Safety
RSSI-based localization technique
RSSI
road traffic
Resiliency
Radio propagation
pubcrawl
automobiles
Metrics
Location Accuracy
localization techniques
localization
INTERLOC
interference-aware RSSI-based localization
interference (signal)
Interference
inter-vehicular communications
heterogeneous interference
GPS
Global Positioning System
composability
biblio
Sybil attack in IOT: Modelling and defenses
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
legitimate nodes
trust value
Throughput
sybil nodes
sybil attacks
security
Routing protocols
Routing
Resiliency
pubcrawl
Peer-to-peer computing
neighbouring nodes
Metrics
ad hoc on-demand distance vector
IoT network
Internet of Things
information technology
enhanced AODV protocol
EAODV protocol
EAODV
delays
defense mechanism
computer network security
composability
behavioural profiling
AODV
biblio
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
birthday attack
collision attack
composability
ERTMS
euroradio
MAC forging
Metrics
pubcrawl
Resiliency
security
sybil attacks
Vulnerability
biblio
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
attacker capabilities
composability
Metrics
pubcrawl
Resiliency
Sybil attack
sybil attacks
Threat Modeling
vulnerabilities
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »