Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Self-establishing a Service Level Agreement within autonomic cloud networking environment
Submitted by BrandonB on Wed, 05/06/2015 - 8:58am
contracts
SLA
Service Level Agreement
security
quality of service
QoS
NaaS services
IaaS services
CSP
autonomic cloud managers
computer architecture
cloud service user
cloud service provider
cloud computing research communities
Cloud Computing
Bandwidth
Availability
autonomic cloud networking environment
biblio
Programmable management framework for evolved SDN
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
OSGI
telecommunication network management
software-defined networking
software radio
Software
security
SDN philosophy
SDN networks
SDN manager
SDN architecture
SDN
Protocols
programmable management framework
PDEE
autonomic network management
on-the-fly code update
network management
management functions
IP networks
Hardware
FIPA
evolved SDN
distributed execution environment
control systems
computer architecture
codes
code lifecycle management
bottom-up approach
biblio
A Software Defined Self-Aware Network: The Cognitive Packet Network
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
SAN
telecommunication security
telecommunication computing
Storage area networks
software radio
software defined self-aware network
Software Defined Networks
Software
self-aware networks
self-aware computer network
security
SDN
autonomic communications
quality of service
QoS
network security
measurement based goal driven behaviour
energy savings
energy consumption
delays
CPN
cognitive radio
cognitive packet network
biblio
Multiagent Web for the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 8:55am
language independent data formats
Web-scale multiagent Internet of Things
Web protocols
transport protocols
sensors
security
Protocols
network of networks
multiagent Web
multiagent architecture
multi-agent systems
Cloud Computing
JSON
Internet of Things
internet
HTTP
heterogeneous platforms
electronic data interchange
Databases
data management architecture
computer architecture
biblio
Vulnerability Assessment in Autonomic Networks and Services: A Survey
Submitted by BrandonB on Wed, 05/06/2015 - 8:51am
Computers
vulnerability management process
Vulnerability Management
vulnerability assessment
security risks
security attacks
security
Monitoring
fault tolerant computing
Autonomic computing
computer security
computer network security
Complexity theory
Business
Autonomic systems
autonomic services
autonomic networks
autonomic management plane
biblio
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:02am
NS-2 simulation
wireless ad hoc networks
Wireless ad hoc network
Vectors
trust value
Trust management
telecommunication traffic
security threats
security
Routing protocols
Routing
reactive routing protocol
partial received packets
packet dropping attacks
Packet dropping
Ad hoc networks
network traffic
mobile ad hoc networks
malicious packet dropping
malicious node
low false positive probability
dynamic trust model
DoS attack
denial of service attack
Conferences
Computers
computer network security
Black hole attack
AODV
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 8:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator
biblio
A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:58am
public key cryptography
wireless sensor networks
Wireless Sensor Network
statistical en-route filtering
Statistical En-Route
security
secure routing method
Secure Routing
Routing protocols
Routing
ad hoc on demand distance vector protocol
Protocols
individual sensor nodes
Gray hole attack
false report detection
Elliptic curve cryptography
ECC
Base stations
AODV protocol
AODV
biblio
A survey of Black hole attack detection in Manet
Submitted by BrandonB on Wed, 05/06/2015 - 7:56am
Mobile communication
telecommunication security
server
security
RREQ
RREP
Routing protocols
route discovery
received RREQ
radiowave propagation
peer-to-peer network
Peer-to-peer computing
network servers
mobile conferencing
academic purpose
mobile ad-hoc network
mobile ad hoc networks
military communication
MANET
Europe
emergency communication
decentralised network
client-server systems
client
black hole attack detection
Black hole attack
AODV protocol
Ad-HOC
biblio
Hash based efficient secure routing for network communication
Submitted by BrandonB on Wed, 05/06/2015 - 7:55am
mobile computing
WLAN
telecommunication security
security
Routing protocols
Routing Protocol
Routing
power backup
packet transfer
networking
network communication
Mobility
Ad hoc networks
Mobile communication
mobile ad-hoc networks
Mobile Ad-hoc
mobile ad hoc networks
infrastructure wireless networks
hash based efficient secure routing
energy problem
Cryptographic Protocols
autonomous network
authentication
attack
« first
‹ previous
…
418
419
420
421
422
423
424
425
426
…
next ›
last »