Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Sybil attack
biblio
Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANET
Submitted by grigby1 on Wed, 04/11/2018 - 2:46pm
adjacent vehicle
Human behavior
Intelligent Transportation System
Internet of Things
Metrics
Peer to Peer networks
pubcrawl
resilience
Resiliency
security
Sybil attack
threat mitigation
trust based
VANET
biblio
A Trust-Based Intrusion Detection System for Mobile RPL Based Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
resilience
wireless sensor networks
Trusted Platform Module co-processor
Trust Routing
telecommunication security
T-IDS
Sybil-Mobile attack
Sybil attack
security attacks
RPL security
routing security
Routing protocols
Routing Protocol
Routing
Resiliency
6LoWPAN
pubcrawl
Peer-to-peer computing
off-load security related computation
Monitoring
mobility support
mobile RPL based networks
mobile radio
Mobile communication
IoT
Intrusion Detection System scheme
intrusion detection system
Intrusion Detection
Cyber Physical Systems Security
composability
biblio
Evaluation of Black Hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks
Submitted by grigby1 on Wed, 08/02/2017 - 1:41pm
Blackhole
detection
MANET
manet attack prevention
pubcrawl
Sybil attack
Wormhole
biblio
Solving Sybil Attacks Using Evolutionary Game Theory
Submitted by grigby1 on Wed, 05/17/2017 - 1:36pm
composability
Evolutionary Game Theory
evolutionary stable strategies
Metrics
pubcrawl
recommender systems
replicator dynamics
Resiliency
Sybil attack
sybil attacks
biblio
Sybil Detection Using Latent Network Structure
Submitted by grigby1 on Wed, 05/17/2017 - 1:36pm
complex contagion
composability
edge detection
latent social network
Metrics
network accountability
provable security
pubcrawl
Resiliency
security
Sybil attack
sybil attacks
biblio
Defending Against Sybil Devices in Crowdsourced Mapping Services
Submitted by grigby1 on Wed, 05/17/2017 - 1:36pm
composability
Compositionality
crowdsourcing
edge detection
Human behavior
location privacy
Metrics
mobile maps
pubcrawl
Resiliency
security
Sybil attack
sybil attacks
wireless networks
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
file
Persea : A Sybil-Resistant Social DHT
Submitted by Katie Dey on Thu, 11/01/2012 - 3:52pm. Contributors:
Matthew Wright
Mahdi Nasrullah Al-Ameen
ABSTRACT
SaTC Posters
DHT
p2p
Sybil attack
University of Texas at Arlington
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
1
2
3
4
5