Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad Hoc Network Security
biblio
Anomaly Detection in Vehicle Platoon with Third-Order Consensus Control
Submitted by aekwall on Mon, 12/20/2021 - 11:20am
Ad Hoc Network Security
Compositionality
consensus strategy
cyber-security control
Fuels
information technology
Metrics
Platooning
pubcrawl
Resiliency
road safety
security
Transportation
VANET
vehicular ad hoc networks
Wireless communication
biblio
Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 11:20am
Ad Hoc Network Security
Ad hoc networks
authentication protocol
Compositionality
Intelligent Transportation Systems
Internet of Things
Metrics
protocol
Protocols
pubcrawl
resilience
Resiliency
security
security protocol
sensors
biblio
A Fuzzy Logic-Based Trust Estimation in Edge-Enabled Vehicular Ad Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 11:19am
Metrics
Wireless communication
vehicular ad hoc networks
VANET
uncertainty
trust
security
Resiliency
pubcrawl
false trust
Image edge detection
Fuzzy sets
Fuzzy logic
estimation
edge computing
Compositionality
Ad Hoc Network Security
biblio
Evaluating V2V Security on an SDR Testbed
Submitted by aekwall on Mon, 12/20/2021 - 11:19am
Ad Hoc Network Security
Compositionality
computer security
Conferences
dedicated short range communication
Jamming
Metrics
Open Source Software
pubcrawl
Resiliency
standards
vehicular ad hoc networks
biblio
Security architecture for UAV
Submitted by aekwall on Mon, 12/20/2021 - 11:19am
Neural networks
wireless
Wi-Fi
vulnerabilities
threats
statistical analysis
security
Resiliency
pubcrawl
Ad Hoc Network Security
Metrics
Law
cyber-physical systems
computer architecture
Compositionality
attacks
ad-hoc systems
Ad hoc networks
biblio
Black Hole Attack in Mobile Ad Hoc Network and its Avoidance
Submitted by aekwall on Mon, 12/20/2021 - 11:19am
wireless networks
Routing protocols
Routing
pubcrawl
mobile nodes
mobile ad hoc networks
MANET – Mobile Ad Hoc Network
DSSR – Destination Sequence Routing
DSR – Dynamic Source Routing
DoS – Denial of Service
AODV – On Demand Distance Vector Routing
Ad Hoc Network Security
Compositionality
Metrics
Resiliency
manet attack prevention
biblio
A Multidimensional Trust Model for Vehicular Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 11:18am
Ad Hoc Network Security
Ad hoc networks
Compositionality
Computational modeling
Conferences
fault tolerance
Fault tolerant systems
malicious nodes
Metrics
pubcrawl
Resiliency
security
trust
VANET
Vehicular Ad-hoc Network
Wireless communication
biblio
Elliptic Curve Parameters Optimization for Lightweight Cryptography in Mobile-Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 11:18am
Ad Hoc Network Security
Ad hoc networks
Compositionality
delays
elliptic curve
Elliptic curve cryptography
lightweight cryptography
Memory management
Metrics
Mobile Ad-Hoc Networks (MANETs)
Power demand
pubcrawl
Resiliency
Routing
Routing protocols
biblio
Securing Drone-based Ad Hoc Network Using Blockchain
Submitted by aekwall on Mon, 12/20/2021 - 11:18am
Drone-based Ad Hoc Network
surveillance
security
Resiliency
pubcrawl
privacy
power plant
power generation
Metrics
drones
Acoustic Information
Compositionality
Blockchain Model
blockchain
Artificial Intelligence
Anomaly Detection
Ad hoc networks
Ad Hoc Network Security
Acoustics
biblio
Efficient and Secure Proxy re-signature Message Authentication Scheme in Vehicular Ad Hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:19am
Metrics
vehicular ad hoc networks
vehicular ad hoc network
VANET
Trusted Computing
trusted center traceability
security requriements
secure proxy resignature message authentication scheme
roadside unit
Resiliency
random oracle model
public key cryptography
proxy re-signature
privacy protection problem
pubcrawl
Internet of Vehicles
formal verification
Elliptic curves
elliptic curve
efficiency requirements
efficiency analysis
ECDLP hard problem
digital signatures
data privacy
conditional privacy protection
Compositionality
Batch verification
Ad Hoc Network Security
« first
‹ previous
1
2
3
4
5
next ›
last »