Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless networks
biblio
Controlling the Communication Overhead of Source Location Privacy Protocols in Multi-hop Communication Wireless Networks
Submitted by grigby1 on Tue, 08/17/2021 - 4:31pm
privacy
wireless sensor networks
Wireless Sensor Network
wireless networks
source location privacy
Routing protocols
Routing
Resiliency
resilience
pubcrawl
communication overhead
Phantoms
phantom routing
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
fake packet routing
energy consumption
Compositionality
biblio
Privacy versus Location Accuracy in Opportunistic Wearable Networks
Submitted by grigby1 on Tue, 08/17/2021 - 4:31pm
Compositionality
Human behavior
intentional errors
Location Accuracy
location privacy
Location Privacy in Wireless Networks
measurement errors
Metrics
obfuscation
Opportunistic Networks
pubcrawl
resilience
Resiliency
Wearable
wireless networks
biblio
Review of Source Location Security Protection using Trust Authentication Schema
Submitted by grigby1 on Tue, 08/17/2021 - 4:31pm
pubcrawl
wireless sensor networks
Wireless Sensor Network
wireless networks
security
Routing protocols
Routing
Resiliency
resilience
Compositionality
Probabilistic source location privacy
privacy
Position measurement
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
biblio
MSCLP: Multi-Sinks Cluster-Based Location Privacy Protection scheme in WSNs for IoT
Submitted by grigby1 on Tue, 08/17/2021 - 4:31pm
Microelectronics
WSNs
wireless sensor networks
wireless networks
source location privacy
Routing
Resiliency
resilience
pubcrawl
privacy
Multi sinks
Compositionality
Metrics
Measurement
Location Privacy in Wireless Networks
location privacy
Human behavior
energy consumption
Dynamic Routing
delays
delay
biblio
Wireless Sensor Networks Mutual Policy For Position Protection
Submitted by grigby1 on Tue, 08/17/2021 - 4:28pm
Protocols
wireless sensor networks
Wireless Sensor Network
wireless networks
Wireless communication
Servers
sensors
Resiliency
resilience
REAL
pubcrawl
3D diagrams
privacy
Optimum
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
Compositionality
antenna
Aggregates
biblio
Key Rate Enhancement by Using the Interval Approach in Symmetric Key Extraction Mechanism
Submitted by aekwall on Tue, 08/17/2021 - 4:17pm
Floors
wireless security
wireless networks
symmetric key extraction mechanism
Quantization (signal)
key rate
key bit difference
interval approach
indoor environment
Scalability
key management
Communication system security
Ad hoc networks
testing
Human behavior
Resiliency
Metrics
pubcrawl
biblio
Operating System Classification: A Minimalist Approach
Submitted by grigby1 on Wed, 08/11/2021 - 11:59am
composability
iOS Security
passive network reconnaissance
Operating system classification
Network reconnaissance
affiliation graphs
social networking (online)
operating systems
wireless networks
machine learning
Cybersecurity
Object recognition
Resiliency
resilience
Metrics
Human Factors
pubcrawl
IP networks
biblio
Mutation Testing to Validate Networks Protocols
Submitted by grigby1 on Wed, 07/28/2021 - 8:47am
ad-hoc networks
Communication system security
Complexity theory
Computing Theory
Metrics
Mutation testing
pubcrawl
Routing
Routing protocols
Security Metrics
Test case quality
testing
Time factors
wireless networks
wireless sensor networks
biblio
Decentralized placement of data and analytics in wireless networks for energy-efficient execution
Submitted by grigby1 on Tue, 07/27/2021 - 12:13pm
Analytical models
composability
Computational modeling
Computing Theory
Data models
Distributed databases
optimization
pubcrawl
Task Analysis
wireless networks
biblio
Mitigating DDoS Flooding Attacks with Dynamic Path Identifiers in Wireless Network
Submitted by aekwall on Mon, 05/03/2021 - 1:11pm
DoS
Router Systems Security
Wireless Routing
Dynamic Path Identifiers (DPID)
AES algorithm
decryption
OTP
wireless networks
Predictive Metrics
Computer crime
Wireless communication
Communication system security
Routing
pubcrawl
Resiliency
encryption
Servers
IP networks
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »