Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Sybil attack
biblio
Deep Learning Technique Based Intrusion Detection in Cyber-Security Networks
Submitted by aekwall on Thu, 01/05/2023 - 5:11pm
Ad hoc networks
wormhole attack
selective forwarding attack
Black hole assault
and Denial-of-Service attack
sybil attacks
Sybil attack
spread spectrum communication
deep learning
Routing protocols
Data models
composability
Resiliency
Metrics
pubcrawl
feature extraction
Artificial Intelligence
Training
Routing
biblio
Sybil Attack Detection in VANETs using an AdaBoost Classifier
Submitted by aekwall on Thu, 01/05/2023 - 5:11pm
Wireless communication
pubcrawl
Metrics
Resiliency
composability
machine learning
vehicular ad hoc networks
Transportation
Eigenvalues and eigenfunctions
road safety
VANET Security
smart cities
Sybil attack
sybil attacks
Misbehavior detection
Vehicle Driving Pattern
biblio
A machine learning based approach for the detection of sybil attacks in C-ITS
Submitted by aekwall on Thu, 01/05/2023 - 5:11pm
machine learning
pseudonym
sybil attacks
Sybil attack
C-ITS
PKI
sustainable development
certificate
Intelligent Transportation Systems
security
composability
Resiliency
Metrics
pubcrawl
Intrusion Detection
VANET
privacy
biblio
An Overview of Sybil Attack Detection Mechanisms in VFC
Submitted by aekwall on Thu, 01/05/2023 - 5:10pm
security
Servers
Fog computing
Time factors
Conferences
pubcrawl
Metrics
Resiliency
composability
vehicular ad hoc networks
detection mechanisms
fake news
Sybil attack
Vehicle driving
VFC
sybil attacks
biblio
Novel Analytical Models for Sybil Attack Detection in IPv6-based RPL Wireless IoT Networks
Submitted by aekwall on Thu, 01/05/2023 - 5:09pm
IPv6
sybil attacks
Sybil attack
Selective Forwarding
Rank/Version number attack
Low-power and Lossy Networks (LLNs)
denial-of-service (DoS)
Stability criteria
RPL
Communication system security
Routing
Routing protocols
composability
Resiliency
Metrics
pubcrawl
Wireless communication
Analytical models
Internet of Things (IoT)
Internet of Things
biblio
Security-Aware Malicious Event Detection using Multivariate Deep Regression Setup for Vehicular Ad hoc Network Aimed at Autonomous Transportation System
Submitted by grigby1 on Fri, 12/09/2022 - 6:29pm
Transportation
Ad Hoc Network Security
Urban VANET
Misbehavior detection
malicious node
mobile nodes
Sybil attack
vehicular ad hoc networks
Scalability
signal processing
real-time systems
composability
Wireless communication
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Intrusion Detection of Sinkhole Attack in Underwater Acoustic Sensor Networks
Submitted by grigby1 on Fri, 05/06/2022 - 4:32pm
Scalability
Sinkhole
Selective Forwarding(SF)
Water pollution
Underwater acoustic sensor network(UASN)
Sybil attack
Sea measurements
Underwater Networks
navigation
security
Metrics
Oceans
Routing
Protocols
Resiliency
resilience
pubcrawl
biblio
Sybil Attacks and Defense on Differential Privacy based Federated Learning
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
deep learning
Training
security
pubcrawl
resilience
Resiliency
privacy
composability
Perturbation methods
Metrics
differential privacy
Collaborative Work
federated learning
sybil attacks
Sybil attack
biblio
The Impact of Sybil Attacks on Vehicular Fog Networks
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
Metrics
Vehicular fog computing
IoV
sybil attacks
Sybil attack
Fog computing
Mathematics
vehicular ad hoc networks
Time factors
Internet of Things
composability
privacy
Safety
Resiliency
resilience
pubcrawl
security
biblio
Detecting Sybil Attack, Black Hole Attack and DoS Attack in VANET Using RSA Algorithm
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
Metrics
wireless sensor networks (WSN)
Sybil attack
sybil attacks
Black hole attack
AODV protocol
DoS attack
Routing protocols
vehicular ad hoc networks
tools
composability
wireless sensor networks
Throughput
Heuristic algorithms
Resiliency
resilience
pubcrawl
security
1
2
3
4
5
next ›
last »