Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensor security
biblio
Secure Mobile Sensor Data Transfer using Asymmetric Cryptography Algorithms
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
encryption
smart devices
secure data transfer
Resiliency
pubcrawl
Mobile Sensor Data Security
Metrics
Meters
Human behavior
sensor security
Elliptic curve cryptography
Databases
Cryptography
composability
Cloud Computing
Ciphers
Asymmetric Encryption
asymmetric algorithms
biblio
Features of Application of Data Transmission Protocols in Wireless Networks of Sensors
Submitted by aekwall on Mon, 02/17/2020 - 1:35pm
internetworking
secure IoT-solution mechanisms
radiotelemetry
publisher-subscriber architecture
protecting devices
network servers
messages
Message Queue Telemetry Transport protocol
gateways
device authentication protection
data transmission protocols
certificate-based authentication
data
queueing theory
sensor networks
protocol
computer network security
sensors
sensor security
authentication
internet
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
transport protocols
Software
Protocols
Internet of Things
biblio
Model for Study of Malware Propagation Dynamics in Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 1:35pm
Wireless Sensor Network
Susceptible-Exposed-Infectious-Recovered-Dead model
Propagation
neighboring sensor nodes
malware status
malware spread
malware propagation dynamics
malicious signals presence
Grippers
Equilibrium points
epidemiology basic reproduction number
Epidemic model
early detection method
critical security challenges
computer viruses
WSN
telecommunication security
security mechanism
Stability analysis
sensor security
detection
Analytical models
Metrics
Computational modeling
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
invasive software
malware
biblio
Improve the security over the wireless sensor networks in medical sector
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
Ciphers
WSN
RC4 algorithms
RC4
medical sector
hospital
data transfer integrity
data transfer confidentiality
data transfer availability
body sensor networks
AES algorithms
AES
Biomedical monitoring
hospitals
Monitoring
sensor security
secure protocol
internet
Metrics
component
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Will Blockchain Technology Become a Reality in Sensor Networks?
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
telecommunication network routing
sensor networks
security features
resource-constrained wireless sensor network
private communication blockchain framework
memory storage
load balancing multihop routing shares
LBMH routing shares
control overhead reduction
constant bit rate
computation power
cluster heads
cluster head
battery life
blockchain technology
sensor security
telecommunication security
resource allocation
blockchain
Metrics
Computational modeling
sensor nodes
Peer-to-peer computing
Routing
wireless sensor networks
batteries
composability
pubcrawl
Human behavior
Resiliency
security
biblio
Security in Wireless Sensors Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Metrics
telecommunication network routing
sensor security
route discovery
Routing protocols
secure routing mechanisms
wireless sensors networks
biblio
Improving Wireless Network Security Based On Radio Fingerprinting
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
security threats
Wireless Network Security
wireless device transmitters
transient signals
radio transmitters
Radio Frequency Fingerprints
radio frequency fingerprint extraction
radio fingerprinting
physical characteristics
fractional fourier transform
Fourier transforms
identity authentication
wireless networks
sensor security
authorisation
Signal to noise ratio
Transient analysis
Metrics
wireless devices
Communication system security
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
feature extraction
security
telecommunication security
biblio
New Approach to Secure Cluster Heads in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
inter-cluster communication
cluster head
resource constraints
Aggregation
Cluster.
cryptographic algorithm
genetic algorithm based search
Head
hierarchical architecture security
malicious attacks
intra-cluster communication
multihop approach
node failure probability
overhead communication
overhead computation
secured WSN deployment
wireless links
Wireless Sensor Network
Metrics
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
sensor nodes
Monitoring
Clustering algorithms
probability
genetic algorithms
security threats
sensor security
Topology
data aggregation
biblio
Security on Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
attack
composability
Human behavior
low-cost sensor nodes
Metrics
placement algorithm
pubcrawl
Resiliency
security
sensor placement
sensor security
telecommunication network routing
telecommunication security
Wireless Sensor Network
wireless sensor network security
wireless sensor networks
biblio
Wireless Sensor Networks Security: Case study
Submitted by aekwall on Mon, 02/17/2020 - 1:33pm
sensor security
wireless sensor networks security
sensor data detection
Sensor
network physical devices
live monitoring
data exchange
data
Network
power consumption
wireless
Elliptic curve cryptography
Data collection
IoT
secure communication
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
encryption
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »