Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vehicular ad hoc network
biblio
A Comprehensive Survey on Vehicular Ad Hoc Networks (VANETs)
Submitted by grigby1 on Tue, 02/08/2022 - 11:41am
Compositionality
vehicular ad hoc network
Security and privacy VANET
Intelligent Transportation System
challenge
Computer applications
manet privacy
vehicular ad hoc networks
Transportation
computer architecture
composability
standards
privacy
Resiliency
resilience
Metrics
pubcrawl
security
biblio
A Safe and Efficient Message Authentication Scheme In The Internet Of Vehicles
Submitted by grigby1 on Wed, 06/30/2021 - 3:57pm
Metrics
vehicular ad hoc networks
vehicular ad hoc network
security authentication
Resiliency
resilience
public key cryptography
pubcrawl
privacy protection
privacy
Aggregate Signature
Internet of Vehicles
information science
Human Factors
Human behavior
cyber physical systems
component
certificateless public key cryptosystem
authentication
Aggregates
biblio
A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Trajectory
vehicular communications
vehicular ad hoc network
trusted third party authorities
Sybil attack detection scheme
safety-related services
multistep verification process
multiple forged identities
deep learning based object detection technique
Advanced Driving Assistant System
ADAS sensors
V2V
Laser radar
driver information systems
Sensor Systems
Autonomous Driving
road safety
object detection
sensors
VANET
telecommunication computing
sybil attacks
Metrics
vehicular ad hoc networks
Global Positioning System
Sybil attack
composability
pubcrawl
Resiliency
learning (artificial intelligence)
telecommunication security
biblio
Trustworthiness Estimation of Entities within Collective Perception
Submitted by aekwall on Mon, 12/07/2020 - 12:32pm
vehicular ad hoc network
vehicles awareness
vehicle shares information
V2X communication
remote vehicle
Misbehavior detection
host vehicle
entities trustworthiness estimation
collective perception information
Collective perception
Bayes filter
vehicle dynamics
data consistency
Radar
Intelligent Transportation Systems
road safety
situational awareness
estimation
sensors
VANET
sensor fusion
trustworthiness
Probabilistic logic
Reliability
vehicular ad hoc networks
composability
pubcrawl
Trusted Computing
telecommunication security
Conferences
biblio
An Efficient Secured Routing Protocol for Software Defined Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:48am
central point coordination
Human Factors
vehicular ad hoc network
Intelligent Transportation Systems
Internet of Vehicles
IoV
cyber physical systems
Routing Protocol
dynamic topology
Software Defined Networks
Energy efficient secured routing protocol
intelligence secure routing
intelligent transport system
network intelligence
RBM
restricted Boltzmann algorithm
software defined Internet of Vehicles
vehicle dynamics
Routing
Internet of Things
security
Software
software defined networking
Resiliency
Human behavior
pubcrawl
Routing protocols
computer network security
telecommunication power management
vehicular ad hoc networks
Metrics
internet
attacks
network lifetime
delays
telecommunication network topology
biblio
Efficient and Secure Proxy re-signature Message Authentication Scheme in Vehicular Ad Hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
Metrics
vehicular ad hoc networks
vehicular ad hoc network
VANET
Trusted Computing
trusted center traceability
security requriements
secure proxy resignature message authentication scheme
roadside unit
Resiliency
random oracle model
public key cryptography
proxy re-signature
privacy protection problem
pubcrawl
Internet of Vehicles
formal verification
Elliptic curves
elliptic curve
efficiency requirements
efficiency analysis
ECDLP hard problem
digital signatures
data privacy
conditional privacy protection
Compositionality
Batch verification
Ad Hoc Network Security
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
biblio
BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET
Submitted by aekwall on Mon, 07/13/2020 - 11:20am
BayesTrust
Web page ranking algorithms
vehicular ad hoc network
VehicleRank
untrusted nodes
threat models
social trust relationship
random topology
pagerank
local trust relationships
local trust information
IWOT-V
implicit Web of trust
global trust relationships
explicit link structure
cooperative intelligent transport system
telecommunication security
web of trust
Intelligent Transportation Systems
Web pages
trust model
telecommunication network topology
mobile ad hoc networks
Topology
VANET
Computational modeling
Social network services
Peer-to-peer computing
vehicular ad hoc networks
composability
pubcrawl
Resiliency
biblio
Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET With the Named Data Architecture
Submitted by aekwall on Tue, 05/26/2020 - 11:11am
stand-alone node RSU
intelligent transport system (ITS)
intermittent connection lifetime
multihop wireless network
named data architecture
named data network (NDN)
named data networking approach
NDN architecture
network simulator
NS3 software packages
RA-NDN protocol
real-world data
SA-RSU
improved network connectivity
SUMO software packages
TCP/IP implementation
total dissemination time
traffic load
traffic simulator software
vehicle to roadside unit (V2R)
vehicular ad hoc network (VANET)
vehicular densities
vehicular NDN
vehicular transmission ranges
Named Data Network Security
internet
IP networks
Scalability
Servers
telecommunication traffic
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Routing protocols
Roads
vehicular ad hoc networks
computer network security
radio networks
VANET
data storage
computer network reliability
vehicular ad hoc network
vehicles
ad hoc communications
data dissemination
data dissemination protocol
data received ratio
distributed roadside unit
biblio
Secure estimation for intelligent connected vehicle systems against sensor attacks
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
Acceleration
Security Risk Estimation
state estimator
sensor attacks
Sensor attack
intelligent control
Intelligent connected vehicles
intelligent connected vehicle system
Channel estimation
closed loop systems
secure estimation
vehicular ad hoc network
telecommunication control
wireless channels
connected vehicles
road vehicles
estimation
Human Factors
Stability analysis
cyber-attacks
Metrics
Wireless communication
Communication system security
vehicular ad hoc networks
telecommunication power management
wireless sensor networks
pubcrawl
Resiliency
telecommunication security
Scalability
1
2
next ›
last »