Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multihop communication
biblio
Collaboration-Based Location Privacy Protection Method
Submitted by grigby1 on Thu, 08/13/2020 - 4:34pm
privacy protection algorithm
collaborative users
information entropy
location anonymity
location privacy
location-based
maximum anonymity value set
multihop communication
personalized anonymity
collaboration-based location privacy protection method
query block exchange
query diversity
query information
random-QBE
Services
spread spectrum communication
user collaboration
user cooperative privacy protection
Switches
Servers
pubcrawl
Human behavior
resilience
Resiliency
data privacy
privacy
composability
collaboration
quality of service
Metrics
query processing
anonymity
groupware
anonymity requirement
anonymous group
anonymous location
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
cheat nodes
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
artificial immune systems
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
Immune system
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
security of data
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
Resiliency
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
mobile ad hoc networks
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field
AODV
Metrics
MANET
IDS
high destination sequence number
destination nodes
delays
data packets
cross checking
Conferences
Compositionality
clustering
byzantine attacks
Blackhole
black-hole attack mitigation techniques
attack mitigation