Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing
biblio
Introducing Mobility Metrics in Trust-based Security of Routing Protocol for Internet of Things
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
Security by Default
Internet of Things
Linear programming
Measurement
Metrics
mobile nodes
Mobility
pubcrawl
Routing
Routing protocols
RPL
security
Security Metrics
smart cities
Smart homes
trust
biblio
Identification and Mitigation of False Data Injection using Multi State Implicative Interdependency Model (MSIIM) for Smart Grid
Submitted by grigby1 on Wed, 03/23/2022 - 12:36pm
pubcrawl
wireless sensor networks
Throughput
Smart Grid Sensors
Smart Grid
simulation
Secure Routing
Scalability
Routing
Resiliency
resilience
composability
phasor measurement unit (PMU)
operational states
Inter Dependency Relations (IDRs)
Human Factors
Human behavior
False Data Injection
Data models
data dependency
Conferences
biblio
A Novel Authentication Mechanism for Securing Underwater Wireless Sensors from Sybil Attack
Submitted by grigby1 on Wed, 03/23/2022 - 11:35am
WSN
UWSN
Underwater Sensor Network
SN
PER
ECR
fuzzy system
underwater communication
sybil attacks
PDR
Fuzzy logic
security
Metrics
energy resources
Routing
composability
Wireless communication
wireless sensor networks
authentication
Resiliency
resilience
pubcrawl
biblio
Sybil Attack Simulation and Mitigation in UnetStack
Submitted by grigby1 on Wed, 03/23/2022 - 11:33am
Resiliency
Water pollution
UnetStack
Underwater acoustic sensor network(UASN)
sybil attacks
Sybil attack
security
Sea measurements
Routing
threat mitigation
resilience
pubcrawl
Protocols
Prediction algorithms
Oceans
Mitigation strategy
Metrics
composability
biblio
A Novel Sybil Attack Detection and Prevention Mechanism for Wireless Sensor Networks
Submitted by grigby1 on Wed, 03/23/2022 - 11:33am
Routing
MITM Attack
Elliptic curve cryptography
Diffie-Hellman key exchange
sybil attacks
AOMDV
Sybil attack
Signal processing algorithms
Metrics
signal processing
composability
Wireless communication
wireless sensor networks
authentication
Throughput
Resiliency
resilience
pubcrawl
biblio
Capturing Attacker Identity with Biteback Honeypot
Submitted by aekwall on Mon, 03/14/2022 - 1:43pm
Routing
feature extraction
pubcrawl
Resiliency
Routing protocols
Prototypes
Predictive Metrics
Virtual private networks
Portable document format
Biteback
honeypot
metasploit
Meterpreter
reverse TCP
Webcams
Router Systems Security
biblio
Modeling the Processing of Non-Poissonian IIoT Traffic by Intra-Chip Routers of Network Data Processing Devices
Submitted by aekwall on Mon, 03/14/2022 - 1:43pm
Predictive Metrics
Router Systems Security
traffic modeling
switching element
switch fabric
sensor systems and applications
parallel switching
Internet of Things
iiot
6G
NoC
Data models
Data processing
Fabrics
Resiliency
pubcrawl
Switches
Streaming media
5G
Routing
IoT
biblio
Fast IPv6 Network Periphery Discovery and Security Implications
Submitted by aekwall on Mon, 03/14/2022 - 1:43pm
security
Routing
pubcrawl
Resiliency
Routing protocols
Systematics
Current measurement
Velocity measurement
ipv6 security
Predictive Metrics
Web and internet services
internet measurement
IPv6 Network Periphery
Routing Loop Attack
Router Systems Security
biblio
On the Role of Named Data Networking for IoT Content Distribution
Submitted by aekwall on Tue, 03/08/2022 - 2:43pm
Content Forwarding
Human behavior
In-Nework storage
information-centric networking
IP networks
named data networking
NDN Challenges
NDN Services
pubcrawl
real-time systems
Resiliency
Routing
Scalability
security
social networking (online)
Web sites
biblio
Securing Network-on-Chips via Novel Anonymous Routing
Submitted by grigby1 on Tue, 03/01/2022 - 4:18pm
Proposals
Trojan horses
system-on-chips
Source Routing
security
Scalability
Routing
Resiliency
resilience
pubcrawl
anonymous routing
Network-on-Chips
network-on-chip
network on chip security
Metrics
hardware trojan
Hardware
Cryptography
Costs
composability
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »