Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
active attacks
biblio
A Hybrid Secure Keyword Search Scheme in Encrypted Graph for Social Media Database
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
query processing
graph
graph encryption
graph generation
graph theory
hybrid secure keyword search scheme
kNK keyword search algorithm
nearest neighbour methods
privacy preservation
encryption
Resiliency
search operation
search process
shortest path algorithm
social media database
social networking (online)
top k nearest keyword search algorithm
nearest neighbor search
encrypted graph
distributed environment
data privacy
Cryptography
confidentiality
computer network security
composability
cloud environment
Cloud Computing
attack graphs
advanced encryption standard algorithm
active attacks
Predictive Metrics
Measurement
pubcrawl
biblio
Double Encryption Using TEA and DNA
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
Ciphers
TEA
secure network communication
passive attacks
Double encryption
data intruders
active attacks
active and passive attacks
decryption time
Resiliency
cryptographic algorithms
DNA
privacy
digital signatures
Data Security
Receivers
Data Transmission
information security
Cryptography
encryption
Metrics
Human behavior
pubcrawl
resilience
biblio
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing procedure
multiple malicious nodes
passive attacks
privacy
pubcrawl
reasoning rules
Resiliency
Routing
routing phases
mobile computing
routing security
security
Syslog
telecommunication network routing
telecommunication security
verification
verification phase
active attacks
mobile ad hoc networks
Metrics
Merkle hash tree
MANETs routing
MANETs
MANET Attack Detection
log-based anomalies detection
flow graphs
flow graph
Diagnostics
composability
cognition
central control program
Anomaly Detection
Ad hoc networks
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes