Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IPv6 Routing Protocol
biblio
ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
Submitted by aekwall on Mon, 01/13/2020 - 12:06pm
local repair attacks
bagged trees
boosted trees
classifier validation methods
ELNIDS
Ensemble Learning
ensemble learning based network intrusion detection system
global connectivity
heterogeneous smart devices
IPv6 Routing Protocol
lossy networks
NIDS
RPL based Internet of Things
RPL-NIDDS17 dataset
RUSBoosted trees
smart devices
subspace discriminant method
RPL
intrusion detection model
wireless networks
classification
routing attacks
Intrusion Detection
6LoWPAN
Vegetation
Routing
Routing protocols
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Internet of Things
security of data
biblio
Attribute Based Trust Evaluation for Secure RPL Protocol in IoT Environment
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
Resiliency
location based service authentication
Low-Power and Lossy Networks
Medical services
memory requirements
personal area networks
physical objects
Protocols
pubcrawl
Public key
location based service
Routing
Routing protocols
RPL
secure RPL Protocol
security
security attacks
smart health care system
Symmetric matrices
Data collection
6LoWPAN networks
ABTE
advanced automation technology
attribute based trust evaluation
authentication
composability
computer network reliability
computer network security
critical data transfer reliability
6LoWPAN
energy constraint networks
energy consumption
Internet of Things
IoT constrained environments
IPv6 Routing Protocol
LBS
lightweight LBS authentication
LL networks
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
biblio
IPv6 Routing Protocol for Low-Power and Lossy Networks Implementation in Network Simulator \#x2014; 3
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Policy
wireless sensor networks
Topology
telecommunication power management
RPL multiple instances
RPL
Routing protocols
Routing
reliable communication
pubcrawl
protocol verification
privacy
policy-based collaboration
Compositionality
physical environments
NS3
ns-3 implementation
network simulator
maintenance engineering
lossy networks implementation
lossy environments
Linear programming
IPv6 Routing Protocol
IP networks
Hardware
efficient energy management system