Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
routing attacks
biblio
IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network
Submitted by grigby1 on Tue, 12/06/2022 - 2:51pm
LLN
Worst parent selection
System performance
simulation
RPL network
Routing protocols
routing attacks
Routing
performance evaluation
Of0)
Ob-jective Function (MRHOF
6LoWPAN
Linear programming
IoT network
Intrusion Detection
IDS
Contiki-Cooja
pubcrawl
composability
resilience
Resiliency
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
An Enhanced Approach for Attack Detection in VANETs Using Adaptive Neuro-Fuzzy System
Submitted by grigby1 on Thu, 10/29/2020 - 11:24am
Compositionality
MANET Attack Detection
vehicle-to-vehicle availability
temporary network
routing attacks
packet drop ratio
mobile ad hoc network
information dispersal approach
fuzzy neural nets
end to end delay
adaptive neuro-fuzzy system
mobile ad hoc networks
QoS
security
vehicular ad hoc networks
VANETs
Attack detection
telecommunication computing
Routing
Protocols
quality of service
Throughput
Resiliency
resilience
Metrics
pubcrawl
biblio
Minimization of Black hole Attacks in AdHoc Networks using Risk Aware Response Mechanism
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
mobile ad hoc network
Vectors
telecommunication network routing
Scalability
routing attacks
Routing
risk aware response technique
risk aware response mechanism
risk aware
Resiliency
resilience
pubcrawl
Mobile handsets
mobile devices
mobile ad hoc networks
Aerospace electronics
minimisation
MANET
Intrusion Response
Human behavior
Heuristic algorithms
DSDV algorithm
Dijkstra shortest path algorithm
destination sequenced distance vector algorithm
Destination sequenced Distance Vector
Conferences
computer science
centralized base point
black hole attack minimization
Attack vectors
biblio
ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
Submitted by aekwall on Mon, 01/13/2020 - 12:06pm
local repair attacks
bagged trees
boosted trees
classifier validation methods
ELNIDS
Ensemble Learning
ensemble learning based network intrusion detection system
global connectivity
heterogeneous smart devices
IPv6 Routing Protocol
lossy networks
NIDS
RPL based Internet of Things
RPL-NIDDS17 dataset
RUSBoosted trees
smart devices
subspace discriminant method
RPL
intrusion detection model
wireless networks
classification
routing attacks
Intrusion Detection
6LoWPAN
Vegetation
Routing
Routing protocols
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Internet of Things
security of data
biblio
Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
mobile ad-hoc network
trust relationship
Throughput
telecommunication security
telecommunication network routing
single malicious node
Routing protocols
routing attacks
Routing
Resiliency
pubcrawl
packet delivery ratio
notice participation
black hole
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
Intrusion Detection
IDS
gray hole
defense mechanism
data packets
composability
biblio
The Waterfall of Liberty: Decoy Routing Circumvention That Resists Routing Attacks
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
censorship circumvention
decoy routing
internet censorship
Metrics
pubcrawl
resilience
Resiliency
Router Systems
Router Systems Security
routing attacks
security
biblio
A Security Routing Protocol for Internet of Things Based on RPL
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
RPL network security
Resiliency
route discovery phase
Routing
Routing attack
routing attacks
Routing protocols
routing recurity
RPL based security routing protocol
pubcrawl
security
security problems
security routing protocol
telecommunication network topology
telecommunication security
test network
test prototype network
Topology
IP networks
collaboration
composability
data routing
flexible topological structure
hierarchical clustering network topology
intelligent device
Internet of Things
IoT
backup path
ipv6 security
lightweight IPv6 network routing protocol
Logic gates
M-RPL network
Metrics
multipath routing
network topology
biblio
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Submitted by grigby1 on Thu, 02/15/2018 - 11:41am
Peer-to-peer computing
Human behavior
human factor
Human Factors
internet
Internet routing infrastructure
IP networks
mining pools
P2P networks
electronic money
pubcrawl
Routing
routing advertisements
routing attacks
routing manipulation
Routing protocols
Scalability
telecommunication network routing
bitcoin security
authorisation
autonomous systems
BGP
BGP hijack
BGP hijacks
BGP routing data
bitcoin
Bitcoin hijacking
ASes
Bitcoin topology
Bitcoin traffic manipulation
Computer crime
cryptocurrencies
cryptocurrency
Cryptography
Data mining
delays