Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing
biblio
Extending Routes in Tor to Achieve Recipient Anonymity against the Global Adversary
Submitted by grigby1 on Wed, 02/09/2022 - 2:49pm
Numerical models
anonymity
anonymous routing
Censorship resistance
composability
Costs
encryption
Human behavior
Metrics
Topology
overlay networks
privacy
pubcrawl
resilience
Resiliency
Routing
Routing protocols
biblio
WIP: An Onion-Based Routing Protocol Strengthening Anonymity
Submitted by grigby1 on Wed, 02/09/2022 - 2:46pm
Onion
Analytical models
anonymity
Anonymous Communication Networks
composability
Global Adversary Model
Human behavior
Metrics
Multimedia communication
Wireless communication
overlay networks
privacy
pubcrawl
resilience
Resiliency
Routing
Routing protocols
timing
biblio
Secure Routing Protocols for MANET-enabled IoT
Submitted by grigby1 on Tue, 02/08/2022 - 11:47am
Wireless communication
MANET security
MANET
AODV
Routing protocols
Compositionality
sensors
Routing
composability
Internet of Things
wireless sensor networks
Cryptography
Resiliency
resilience
Metrics
pubcrawl
IoT
security
biblio
New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Intrusion Detection System (IDS)
MANET Attack Detection
mobile ad hoc network
Naive Bayes
support vector machine
Random Forest
random forests
Radio frequency
network intrusion detection
Support vector machines
Routing protocols
Compositionality
Resiliency
Metrics
pubcrawl
machine learning
Training
Routing
biblio
To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
Compositionality
mobile computing
Monitoring
pubcrawl
Routing
Routing protocols
manet attack prevention
Resiliency
Metrics
mobile ad hoc networks
AODV
AODV protocol
Black hole attack
data transfer
Detection and Prevention.
MANET
MANET Attack Detection
biblio
Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM)
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
MANET
MANET Attack Detection
HCIDM
Cluster Routing
CCIDM
trust
wireless networks
mobile computing
Ad hoc networks
collaboration
Compositionality
Resiliency
Metrics
pubcrawl
Routing
Intrusion Detection
Clustering algorithms
biblio
Detection Jellyfish Attacks Against Dymo Routing Protocol on Manet Using Delay Per-Hop Indicator (Delphi) Method
Submitted by aekwall on Mon, 02/07/2022 - 5:08pm
delays
Routing
information technology
Wireless communication
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
mobile computing
Routing protocols
DELPHI
DYMO
Jellyfish
MANET Attack Detection
biblio
Detection and Prevention of Blackhole Attack in AODV of MANET
Submitted by aekwall on Mon, 02/07/2022 - 5:08pm
clustering
manet attack prevention
Resiliency
Metrics
Compositionality
AODV
Black hole attack
Routing protocols
Topology
Routing
Conferences
MANET
MANET Attack Detection
mechatronics
mobile nodes
network topology
Partitioning algorithms
pubcrawl
biblio
Enhancing SAT-Attack Resiliency and Cost-Effectiveness of Reconfigurable-Logic-Based Circuit Obfuscation
Submitted by aekwall on Fri, 02/04/2022 - 10:35am
reverse engineering
security
Observability
Routing
resilience
pubcrawl
Integrated circuit modeling
logic locking
Switching circuits
Resiliency
Table lookup
LUT-based obfuscation
Reconfigurable Logic
SAT-based attack
biblio
Computational Intelligence Technologies Stack for Protecting the Critical Digital Infrastructures against Security Intrusions
Submitted by grigby1 on Mon, 01/10/2022 - 4:56pm
Metrics
wireless networks
tools
Swarm Intelligence
security management
security
SDN
Routing
Resiliency
resilience
quantum machine learning
QML
pubcrawl
artificial intelligence security
Market research
machine learning
Intrusion Detection
Human behavior
FDI
critical digital infrastructure
computational intelligence
composability
CI
CDI
Artificial Neural Networks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »