Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data traffic
biblio
Trust-based Incentive for Mobile Offloaders in Opportunistic Networks
Submitted by grigby1 on Tue, 07/27/2021 - 11:06am
Base stations
computer science
computer theory
Conferences
Data offloading
data traffic
Human behavior
incentive
Mobile handsets
Nash Equilibrium
Opportunistic Networks
pubcrawl
Relays
Target set selection
trust
Wireless fidelity
biblio
Adaptive Caching for Beneficial Content Distribution in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:31pm
in-network caching
utility-based replacement
request arrival rate
next-generation networking
network design
in-network caching mechanism
ICN interconnections
Future Internet (FI)
content-based providers
cache diversity
beneficial content distribution
beneficial caching scheme
adaptive caching mechanism
cache hit rate
content distribution
Information-Centric Networking (ICN)
IP networks
Information Centric Networks
information-centric networking
QoS
Proposals
quality of service
network topology
service providers
Economics
internet
pubcrawl
Resiliency
data traffic
security
telecommunication traffic
Scalability
biblio
Building Dynamic Mapping with CUPS for Next Generation Automotive Edge Computing
Submitted by grigby1 on Wed, 12/02/2020 - 1:03pm
response latency
Logic gates
mobility management (mobile radio)
next generation automotive edge computing
next generation networks
next-generation intelligent transportation system
Prototypes
pubcrawl
resilience
Resiliency
local edge server
road traffic
Scalability
Servers
synchronisation
telecommunication control
telecommunication traffic
traffic accidents
traffic engineering computing
vehicle dynamics
data traffic
5G mobile communication
5G networks
central cloud-based approach
central server
Cloud Computing
computer architecture
control and user plane separation
coupled congestion control
CUPS
5G
Dynamic mapping
dynamic mapping traffic
edge computing
edge computing architecture
edge servers
global dynamic mapping information
Intelligent Transportation Systems
Internet of Things
IoT
biblio
Game theoretic approach towards intrusion detection
Submitted by aekwall on Mon, 12/30/2019 - 11:25am
Games
game theoretic security
probe attacks
NSLKDD dataset
game model
dominated strategies elimination method
Dominated Strategies
game theoretic approach
Predictive Metrics
Human Factors
Probes
Intrusion Detection
wireless sensor networks
pubcrawl
network security
data traffic
game theory
Protocols
Scalability
intrusion detection system
security of data
biblio
An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack
Submitted by aekwall on Wed, 02/13/2019 - 10:59am
Resiliency
machine learning based intelligent method
Naive Bayes
naive Bayes algorithm
nearest neighbour methods
network computing environment
network layer
network management mechanism
operating system
pubcrawl
machine learning algorithms
Scalability
SDN network
Software Defined Network
Software Defined Network architecture
software defined networking
support vector machine
Support vector machines
telecommunication traffic
data traffic
Attack vectors
Bayes methods
Classification algorithms
computer architecture
Computer crime
computer network management
computer network security
cyber security
Data models
Application Layer
denial of service
distributed denial of service
distributed denial of service attack
Human behavior
infected packets
intelligent software
intelligent software defined network controller
k-nearest neighbor
biblio
Random Projection Data Perturbation Based Privacy Protection in WSNs
Submitted by grigby1 on Tue, 02/06/2018 - 1:04pm
PPND algorithm
wireless sensor networks
telecommunication security
Sparse projection data perturbation
Sparse matrices
SMART algorithm
security
Resiliency
random projection data perturbation based privacy protection
pubcrawl
privacy protection requirements
privacy preserving
pre-distribution random number
Algorithm design and analysis
node privacy
Network reconnaissance
network coverage area
data traffic
data privacy protection mechanism
data privacy
Data integration
data fusion technology
data fusion algorithm
data fusion
Conferences