Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Sybil attack
biblio
Proof of Work Without All the Work
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
peer to peer security
bitcoin
Byzantine Consensus
Committee Election
composability
Metrics
peer-to-peer networks
Proof of Work
pubcrawl
Sybil attack
sybil attacks
biblio
Fraud De-Anonymization for Fun and Profit
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
pubcrawl
composability
app store optimization
crowdturfing
fake review
fraud de-anonymization
opinion spam
search rank fraud
Sybil attack
sybil attacks
Metrics
biblio
An Efficient and Secure Directed Diffusion in Industrial Wireless Sensor Networks
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
pubcrawl
composability
directed diffusion
iwsns
node compromise
pairing
Sinkhole attack
Sybil attack
sybil attacks
Metrics
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
smart toasters
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grid Sensors
smart grid stations
Smart Grids
pubcrawl
smartphone
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
Human behavior
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
attacks
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
biblio
Attacks and mitigation techniques on mobile ad hoc network \#x2014; A survey
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
mobile ad hoc networking
ubiquitous computing
telecommunication network routing
Sybil attack
routing table
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
attack mitigation
mobile ad hoc network
mitigation techniques
military search operations
military rescue operations
Metrics
Market research
MANET
Compositionality
civilian environment
attacks techniques
attacks in manet
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Submitted by K_Hooper on Wed, 05/02/2018 - 9:42am
Symmetric matrices
pubcrawl
Resiliency
road vehicles
runtime complexity optimization
Sybil attack
Sybil attack detection
Sybil attack vulnerability
sybil attacks
pseudonymous based privacy protection mechanism
traffic engineering computing
Transmitters
vehicle classification
Vehicle Driving Pattern
vehicle location privacy
vehicular network
vehicular networking
wireless sensor networks
Intrusion Detection
composability
computational complexity
data privacy
driving pattern similarity
Eigenvalues and eigenfunctions
ETSI
IEEE
Intelligent Transportation Systems
Ad hoc networks
k-nearest neighbours classification
kNN classification algorithm
machine learning
Metrics
pattern classification
Peer-to-peer computing
privacy
biblio
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
Transportation Systems
Spectrogram
speech processing
Sybil attack
Sybil attack detection method
sybil attacks
testing
Time series analysis
traffic engineering computing
RSSI time series
V2I communications
V2V communications
VANET
vehicle-to-infrastructure communications
vehicle-to-vehicle communications
vehicular ad hoc networks
vehicular speech
Voiceprint
pubcrawl
computer network security
Dynamic Time Warping
Intelligent Transportation Systems
Metrics
mobile computing
Peer-to-peer computing
position estimation
Position measurement
composability
Radio propagation
radio propagation models
Received signal strength indicator
Receivers
Resiliency
road safety
RSSI
biblio
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
attacker capabilities
composability
Metrics
pubcrawl
Resiliency
Sybil attack
sybil attacks
Threat Modeling
vulnerabilities
biblio
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
RPL protocol
pubcrawl
resilience
Resiliency
Routing
routing protocol for low-power and lossy networks
Routing protocols
routing security
RPL
power aware computing
Scalability
stolen identities
Sybil attack
SybM
Topology
Trust Routing
trust-based intrusion detection system
IoT security
computer network performance evaluation
computer network security
control overhead
energy consumption
fake control messages
Internet of Things
Internet of Things applications
IoT
composability
mobile computing
mobile nodes
mobile sybil attacks
network topology
packet delivery
performance evaluation
physical adversary
« first
‹ previous
1
2
3
4
5
next ›
last »