Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Sybil attack
biblio
Sybil Attack Simulation and Mitigation in UnetStack
Submitted by grigby1 on Wed, 03/23/2022 - 11:33am
Resiliency
Water pollution
UnetStack
Underwater acoustic sensor network(UASN)
sybil attacks
Sybil attack
security
Sea measurements
Routing
threat mitigation
resilience
pubcrawl
Protocols
Prediction algorithms
Oceans
Mitigation strategy
Metrics
composability
biblio
A Novel Sybil Attack Detection and Prevention Mechanism for Wireless Sensor Networks
Submitted by grigby1 on Wed, 03/23/2022 - 11:33am
Routing
MITM Attack
Elliptic curve cryptography
Diffie-Hellman key exchange
sybil attacks
AOMDV
Sybil attack
Signal processing algorithms
Metrics
signal processing
composability
Wireless communication
wireless sensor networks
authentication
Throughput
Resiliency
resilience
pubcrawl
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Trajectory
vehicular communications
vehicular ad hoc network
trusted third party authorities
Sybil attack detection scheme
safety-related services
multistep verification process
multiple forged identities
deep learning based object detection technique
Advanced Driving Assistant System
ADAS sensors
V2V
Laser radar
driver information systems
Sensor Systems
Autonomous Driving
road safety
object detection
sensors
VANET
telecommunication computing
sybil attacks
Metrics
vehicular ad hoc networks
Global Positioning System
Sybil attack
composability
pubcrawl
Resiliency
learning (artificial intelligence)
telecommunication security
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
IoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
Resiliency
trustworthiness management
trust value
Topology
time 9.3287 s
time 18.1029 s
sybil attacks
Sybil attack
Servers
sensors
security of data
security attacks
trustworthiness
physical object
performance evaluation
Metrics
IoT object security
intruder object
Internet of Things
electronic data interchange
data exchange
authentication
composability
pubcrawl
biblio
Network Layers Threats its Countermeasures in WSNs
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
security countermeasures
WSN
wormhole attack
wireless sensor networks
telecommunication security
telecommunication network reliability
Sybil attack
Sinkhole attack
selective forwarding attack
security requirements
security hazards
Blackhole attack
Scalability
Resiliency
resilience
reliable file exchange
pubcrawl
network layer threats
network layer intrusions
hello flood attack
dimensionally diffused nodes
Blackhole Attack And Hello Flood Attac
biblio
Switching Topology for Resilient Consensus Using Wi-Fi Signals
Submitted by grigby1 on Mon, 03/02/2020 - 1:38pm
Topology
societal integration
Switches
switching signal
switching topology
Sybil attack
sybil attacks
telecommunication network topology
telecommunication security
telecommunication switching
security
true graph
untrustworthy agents
untrustworthy transmissions
Wi-Fi signals
wireless channels
Wireless communication
wireless LAN
wireless sensor networks
wireless transmissions
multirobot team security
Communication system security
composability
connected topology
graph theory
initial topology
legitimate agents
Metrics
multi-robot systems
multiagent consensus
arbitrary malicious node values
network topology
physical networks
physical properties
probability
pubcrawl
resilience
Resiliency
resilient consensus
biblio
Preventing Sybil Attack in Blockchain Using Distributed Behavior Monitoring of Miners
Submitted by grigby1 on Mon, 03/02/2020 - 1:38pm
preventing Sybil attack
virtual nodes
traditional attacks
sybil attacks
Sybil attack
supply chain management etc
supply chain management
security
robust identity management
Resiliency
resilience
pubcrawl
pseudonymous identities
Behavior monitoring
Metrics
genuine nodes
Fake user accounts
distributed behavior
Digital transaction
data privacy
Cryptography
computer network security
composability
blockchain test bed
blockchain technology
blockchain
« first
‹ previous
1
2
3
4
5
next ›
last »