Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
An Efficient Approach for Wormhole Detection in MANET
Submitted by grigby1 on Wed, 08/02/2017 - 12:40pm
AODV
detection
MANET
manet attack prevention
pubcrawl
security
wormhole attack
biblio
Secure DSR Routing Protocol Based on Homomorphic Digital Signature
Submitted by grigby1 on Wed, 08/02/2017 - 12:40pm
detection
Dsr
Homomorphic
integrity
MANET
manet attack prevention
pubcrawl
security
biblio
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
Submitted by grigby1 on Wed, 08/02/2017 - 12:40pm
detection
manet attack prevention
mobile ad-hoc network
Multi-hope
Prevention
pubcrawl
security
tunneling
wormhole attack
biblio
Smart Meter Data Analysis
Submitted by grigby1 on Mon, 07/24/2017 - 1:09pm
collaboration
Human behavior
privacy
pubcrawl
security
Smart Grid
smart grid consumer privacy
smart meters
biblio
The Prospects of Application of Information Technologies and the Principles of Intelligent Automated Systems to Manage the Security Status of Objects of Energy Supply of Smart Cities
Submitted by grigby1 on Mon, 07/24/2017 - 1:09pm
collaboration
energy supply
Human behavior
intelligent automated systems
privacy
pubcrawl
security
smart cities
smart grid consumer privacy
biblio
Secure Stable Matching at Scale
Submitted by grigby1 on Mon, 07/24/2017 - 12:56pm
Control Theory
gale-shapley
multi-party computation
pubcrawl
ram secure computation
Resiliency
roth-peranson
Secure computation
security
stable matching
biblio
A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems
Submitted by grigby1 on Mon, 07/24/2017 - 12:56pm
complex ICT systems
Control Theory
graph theory
pubcrawl
Resiliency
risk assessment
security
biblio
Improvements to Secure Computation with Penalties
Submitted by grigby1 on Mon, 07/24/2017 - 12:56pm
bitcoin
Control Theory
fairness
pubcrawl
Resiliency
Secure computation
security
biblio
Systematic Analysis of Qualitative Data in Security
Submitted by grigby1 on Mon, 07/24/2017 - 12:56pm
Control Theory
grounded theory
pubcrawl
qualitative
Resiliency
security
Security analysis
biblio
How to Safely Augment Reality: Challenges and Directions
Submitted by grigby1 on Tue, 06/27/2017 - 12:18pm
augmented reality
composability
Human behavior
immersive systems
Resiliency
security
« first
‹ previous
…
387
388
389
390
391
392
393
394
395
…
next ›
last »