Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless networks
biblio
Prediction and Detection of Cyberattacks using AI Model in Virtualized Wireless Networks
Submitted by grigby1 on Tue, 03/15/2022 - 2:18pm
Predictive models
pubcrawl
Scalability
Data models
Computational modeling
Artificial Intelligence
Communication system security
wireless networks
Numerical models
Bayes methods
Scalable Security
Bayesian network
Detection of cyberattacks
Wireless Virtualization
biblio
‘WLAN Security Protocols and WPA3 Security Approach Measurement Through Aircrack-ng Technique’
Submitted by aekwall on Mon, 03/14/2022 - 1:42pm
security
Protocols
Linux
Computer hacking
pubcrawl
Resiliency
wireless networks
Predictive Metrics
Atmospheric modeling
Aircrack-ng
Airodump-ng
Crack
Kali Linux
Standards organizations
Router Systems Security
biblio
Prevention of Rushing Attack in AOMDV using Random Route Selection Technique in Mobile Ad-hoc Network
Submitted by aekwall on Tue, 02/22/2022 - 2:11pm
Simulation Network (NS2)
Metrics
mobile nodes
pubcrawl
Random route selection
Resiliency
Routing protocols
rushing attack
security
Measurement
Throughput
time threshold value Technique
wireless networks
AOMDV
Compositionality
delays
MANET
manet attack prevention
biblio
Intrusion Detection in VANETs
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Attacks on VANET
Compositionality
computer architecture
IDS
Intrusion Detection
intrusion detection system
MANET Attack Detection
Metrics
pubcrawl
Reliability
Resiliency
security
Training data
VANET Security
vehicular ad hoc networks
wireless networks
biblio
Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM)
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
MANET
MANET Attack Detection
HCIDM
Cluster Routing
CCIDM
trust
wireless networks
mobile computing
Ad hoc networks
collaboration
Compositionality
Resiliency
Metrics
pubcrawl
Routing
Intrusion Detection
Clustering algorithms
biblio
Web Controlled Raspberry Pi Robot Surveillance
Submitted by grigby1 on Thu, 02/03/2022 - 4:07pm
Cameras
robot operating systems security
WEB monitoring
Surveillance robot
obstacle avoiding
global controlling
Raspberry Pi
Robot vision systems
Human Factors
surveillance
collaboration
visualization
wireless networks
robots
Resiliency
resilience
policy-based governance
pubcrawl
security
biblio
IIoT Decentralized System Monitoring for Smart Industry Applications
Submitted by aekwall on Mon, 01/31/2022 - 4:16pm
security
wireless sensor networks
performance evaluation
Protocols
pubcrawl
Metrics
Resiliency
composability
Industries
wireless networks
process control
wireless mesh networks
biblio
An Efficient Group Secret Key Generation Scheme for Wireless Sensor Network
Submitted by aekwall on Mon, 01/31/2022 - 4:15pm
simulation
wireless sensor networks
pubcrawl
Metrics
Resiliency
composability
Smart Grids
wireless networks
physical layer security
Mesh networks
wireless mesh networks
code-domain
error correction codes
group secret key generation
information exchanges
biblio
Replication Scheme for Structured P2P System Applications in Wireless Mesh Networks (WMNs)
Submitted by aekwall on Mon, 01/31/2022 - 4:14pm
performance evaluation
Scalability
pubcrawl
Metrics
Resiliency
composability
Technological innovation
wireless networks
Costs
maintenance engineering
Popularity of Content
replication
Structured P2P Systems
wireless mesh networks
WMN
biblio
An Efficient Ciphertext Policy Attribute-Based Encryption Scheme from Lattices and Its Implementation
Submitted by aekwall on Tue, 01/25/2022 - 3:52pm
Measurement
Resists
attribute-based encryption
Conferences
encryption
pubcrawl
Scalability
Human behavior
policy-based governance
wireless networks
Lattices
access tree
Ciphertext policy attribute-based encryption
lattice-based cryptography
M-LWE
Numerical models
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »