Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless networks
biblio
SCAFFISD: A Scalable Framework for Fine-Grained Identification and Security Detection of Wireless Routers
Submitted by aekwall on Mon, 05/03/2021 - 1:09pm
Prototypes
wireless networks
wireless network
Vulnerability
security
Router Systems Security
router
Resiliency
pubcrawl
Scalable Security
privacy
Predictive Metrics
performance evaluation
Object recognition
Device Identification
Communication system security
access point
biblio
Towards Improved Network Security Requirements and Policy: Domain-Specific Completeness Analysis via Topic Modeling
Submitted by grigby1 on Thu, 04/29/2021 - 2:17pm
Communication networks
Communication system security
completeness
empirical evaluation
Loading
machine learning
network security
policy-based governance
pubcrawl
Requirements quality
security
security policies
Semantics
Text recognition
wireless networks
biblio
Adaptive Flow-Level Scheduling for the IoT MAC
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
Schedules
mobile computing
policy-based approach
Protocols
pubcrawl
QoS requirements
quality of service
resilience
Resiliency
Metrics
telecommunication scheduling
WiFi networks
Wireless communication
Wireless fidelity
wireless LAN
wireless MAC
wireless networks
high-density networks
adaptive flow-level scheduling
Admission control
best-effort scheduling
carrier sense multiple access
clean slate
collaboration
distributed CSMA
distributed MAC protocols
access protocols
high-speed mobile Internet access
Human behavior
Internet of Things
IoT communications
IoT MAC
IoT-M2M applications
machine-to-machine communication
biblio
Cognitive Radio Networks: Recent Advances in Spectrum Sensing Techniques and Security
Submitted by aekwall on Mon, 03/15/2021 - 12:04pm
wireless nodes
Cognitive Radio Security
wireless spectrum
spectrum sensing techniques
spectrum resources
spectrum access
Dynamic Spectrum Allocation
Channel allocation
spectrum sensing
cognitive radio networks
cognitive radio
wireless network
Reinforcement learning
radio spectrum management
telecommunication security
Energy Efficiency
wireless networks
wireless channels
signal detection
sensors
radio networks
wireless devices
Communication system security
resource management
wireless sensor networks
pubcrawl
Resiliency
biblio
Detection and Prevention of Black Hole Attack in SUPERMAN
Submitted by aekwall on Tue, 03/09/2021 - 12:39pm
manet attack prevention
Ad hoc networks
Black hole attacks
MANET Attack Detection
mobile computing
pubcrawl
Resiliency
Routing
Routing protocols
Scalability
security
Telecommunications
wireless networks
biblio
Network-based Anomaly Intrusion Detection System in MANETS
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
network intrusion detection
wireless networks
wireless network
wireless Adhoc networks
wired environment
telecommunication security
security of data
security
Routing protocols
Resiliency
resilience
pubcrawl
pre-existing unfolding solutions
Network-based anomaly intrusion detection system
Network Simulator-2
network protocols
MANET Attack Detection
mobile radio
mobile adhoc networks
mobile ad hoc networks
Metrics
MANETs
intrusion detection techniques
intrusion detection system
infrastructure-less networks
IDS
fixed wired network
Compositionality
component
Ad hoc networks
ad hoc network
biblio
A Proof of Concept Denial of Service Attack Against Bluetooth IoT Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
wireless LAN
bluetooth security
study Bluetooth security
study Bluetooth device security
proof-of-concept DoS attack
operation necessitates special hardware
frequency-hoping spread spectrum technique
forming ad hoc networks
device-to-device communications
concept denial
Bluetooth technologies
Bluetooth IoT devices
Bluetooth devices security
denial of service
wireless networks
human computer interaction
tools
Ad hoc networks
composability
standards
personal area networks
Protocols
telecommunication security
Software
computer network security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
security
Internet of Things
biblio
Congestion aware traffic grooming in elastic optical and WiMAX network
Submitted by grigby1 on Wed, 12/02/2020 - 1:52pm
telecommunication network topology
Relays
resilience
Resiliency
resource allocation
Routing
Scalability
telecommunication congestion control
telecommunication network routing
pubcrawl
telecommunication traffic
Traffic grooming
WDM-PON (Wavelength Division Multiplexed Passive Optical Network)
WiMax
WiMAX network
wireless networks
Wireless-Optical/Optical-Wireless Network
Worldwide Interoperability Microwave Access Network
Light trail WiMAX (World Interoperability for Microwave Access Network)
Base stations
BVT (Bandwith Variable Transponder)
congestion aware traffic
coupled congestion control
Coupled Congestion Control 2019
Elastic Optical Network
internet
internet accessibility
Bandwidth
network congestion
network resource consumption
network resource utilization
network topologies
OLT (Optical Line Terminal)
ONU (Optical Network Unit)
Passive Optical Network
Passive optical networks
biblio
Analysis of Local Secure Connectivity of Legitimate User in Stochastic Wireless Networks
Submitted by grigby1 on Fri, 11/20/2020 - 1:52pm
secure connection probability
Rayleigh channels
corresponding isolated secure probability
density ratio
eavesdropper collusion
isolated security probability
legitimate user
local secure connectivity
Rayleigh fading
physical layer security
secure wireless communication
secure wireless connection
stochastic networks
stochastic wireless networks
wireless channel conditions
wireless channel fading
Stochastic Computing Security
wireless channels
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Communication system security
radio networks
Receivers
security
wireless networks
Stochastic processes
probability
Monte-Carlo simulation
Monte Carlo methods
Transmitters
fading channels
biblio
Location Privacy and Changes in WiFi Probe Request Based Connection Protocols Usage Through Years
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
mobile devices security breaches
Probes
Wireless fidelity
Compositionality
wireless networks
access protocols
data leaks
Broadcast Probe Request packets
connection protocols usage
wireless LAN
passive WiFi monitoring scans
probe request
SSID
WiFi
WiFi Access Points
WiFi Probe Request packets
Location Privacy in Wireless Networks
computer network security
tracking
mobile radio
smart phones
Metrics
privacy
Mobile handsets
location privacy
pubcrawl
Human behavior
Resiliency
Protocols
IoT devices
Internet of Things
data privacy
Monitoring
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »