Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network lifetime
biblio
Impact of Minimizing the Eavesdropping Risks on Lifetime of Underwater Acoustic Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 2:59pm
pubcrawl
Underwater Networks
Underwater acoustics
underwater acoustic sensor networks
underwater
security
Scalability
Resiliency
resilience
Receivers
batteries
optimization
Numerical models
network lifetime
Metrics
Linear programming
Energy Efficiency
eavesdropping attack
eavesdropping
Cyber Physical System
biblio
Trust Evaluation for Securing Compromised data Aggregation against the Collusion Attack in WSN
Submitted by aekwall on Mon, 06/28/2021 - 12:31pm
network lifetime
false trust
tree
magnetic heads
Routing
Wireless Sensor Network
Base stations
cluster
sensors
base station
Scalability
Clustering algorithms
wireless sensor networks
data aggregation
policy-based governance
pubcrawl
Resiliency
security
architecture
biblio
Evolving Dynamically Reconfiguring UAV-hosted Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:45pm
quick temporary networked communications capabilities
MESH network
bandwidth requirements
different user distributions
evolutionary adaptive network deployment algorithm
evolving dynamically reconfiguring UAV-hosted mesh networks
flying network base stations
initial deployment
overwatch
potential field parameters
potential fields
remotely operated vehicles
remote areas
reposition UAVs
scouting
tuned potential fields
UAV network
Unmanned Aerial Vehicles
unmanned aerial vehicles networks
user bandwidth coverage
user bandwidth needs
Wireless Mesh Network Security
mobile radio
Resiliency
pubcrawl
composability
batteries
wireless sensor networks
Metrics
mobile robots
Training
optimisation
network lifetime
security
genetic algorithm
genetic algorithms
Bandwidth
Mesh networks
control engineering computing
Path Planning
autonomous aerial vehicles
Base stations
distributed control
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
Multi-branch Source Location Privacy Protection Scheme Based on Random Walk in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
multibranch source location privacy protection method
radiofrequency interference
WSN
source node
location privacy preservation
communication overhead
Position measurement
location security
branch interference area
location-related data
Base stations
multibranch source location privacy protection scheme
multiple branch
multiple proxy sources
proxy source
random walk
sensing information
sink location privacy
Location Privacy in Wireless Networks
privacy
data privacy
telecommunication security
security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
location privacy
Monitoring
Routing
sensor nodes
Metrics
random processes
network lifetime
base station
Compositionality
privacy protection
biblio
Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
Compositionality
Location Privacy in Wireless Networks
tree-based algorithm
source location privacy routing schemes
SLP routing schemes
routing scheme algorithms
routing algorithms
representative schemes
privacy protection level
network lifetime performance
lowest network lifetime
highest influence
angle-based algorithm
source location privacy
Phantoms
Position measurement
data privacy
energy consumption
network lifetime
telecommunication network routing
Mathematical model
trees (mathematics)
Metrics
Computational modeling
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
biblio
An Efficient Secured Routing Protocol for Software Defined Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:48am
central point coordination
Human Factors
vehicular ad hoc network
Intelligent Transportation Systems
Internet of Vehicles
IoV
cyber physical systems
Routing Protocol
dynamic topology
Software Defined Networks
Energy efficient secured routing protocol
intelligence secure routing
intelligent transport system
network intelligence
RBM
restricted Boltzmann algorithm
software defined Internet of Vehicles
vehicle dynamics
Routing
Internet of Things
security
Software
software defined networking
Resiliency
Human behavior
pubcrawl
Routing protocols
computer network security
telecommunication power management
vehicular ad hoc networks
Metrics
internet
attacks
network lifetime
delays
telecommunication network topology
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
Joint Sybil Attack Prevention and Energy Conservation in Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
composability
energy conservation
hierarchical routing
Metrics
network lifetime
pubcrawl
resilience
Resiliency
sybil attacks
wireless sensor networks
biblio
Secure and Composite Routing Strategy through Clustering In WSN
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
composability
data trust
Malicious Detection Rate
network lifetime
pubcrawl
Scalability
Social trust
trust model
Trust Routing
Wireless Sensor Network
1
2
next ›
last »