Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
VANETsim: An open source simulator for security and privacy concepts in VANETs
Submitted by BrandonB on Mon, 05/04/2015 - 12:56pm
privacy
vehicular communications
Vehicular Communication
vehicular ad hoc networks
vehicles
VANETsim
VANET
Simulator
Security in Mobile and Wireless Networks
security
Roads
road safety
public domain software
Privacy-Enhancing Technology
Analytical models
open source simulator
mobile computing
Intrusion and Attack Detection
graphical user interfaces
graphical user interface
event-driven simulation platform
discrete event simulation
data privacy
Car2Car
application-level security implications
application-level privacy implications
anonymity
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 12:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations
biblio
OSAP: Optimal-cluster-based source anonymity protocol in delay-sensitive wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 12:47pm
network traffic
wireless sensor networks
wireless networks
telecommunication traffic
telecommunication security
source anonymity
security
real event report latency
Protocols
OSAP
optimal cluster based source anonymity protocol
network traffic reduction
Base stations
mobile computing
Mobile communication
global attacker
fake packet injection
event source location privacy
event source anonymity
delays
delay sensitive wireless sensor networks
data privacy
cluster-based wireless sensor network
challenging attack model
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 12:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)
biblio
Protecting and Identifiying Smartphone Apps Using Icmetrics
Submitted by BrandonB on Mon, 05/04/2015 - 12:12pm
Humanoid robots
Web-server spoofing
software programs
Software
smartphone application protection
smartphone application identification
smart phones
security
Mobile Security
identifier generation
ICmetrics
Android apps
hardware programs
Hardware
fraud identification
feature extraction
encryption key generation
encryption
Cryptography
biometrics
Androids
Android security
biblio
Human acoustic fingerprints: A novel biometric modality for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 10:31am
mobile devices
unsupervised learning approach
transient evoked otoacoustic emission
Training
Time-frequency Analysis
security
pre-enrolled identity gallery
otoacoustic emissions
Otoacoustic Emission
Neural networks
neural nets
Mobile Security
Mobile handsets
mobile environment
Acoustic signal processing
mobile computing
Mobile communication
mobile biometric system
learning model
learning (artificial intelligence)
human acoustic fingerprints
generic dataset
feature extraction
blind recognition problem
biometrics (access control)
Biometric Verification
biometric modality
Autoencoder Neural Network
biblio
Mitigating Flooding Attacks on Mobility in Infrastructure-Based Vehicular Networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:51am
mobility management
WMN
wireless mesh networks
vehicular networks
telecommunication security
technological convergence
security
secure mobility scheme
packet delivery ratio
network access
negative effects
Monitoring
mobility management (mobile radio)
ARP packets flooding
Mobility
Mobile radio mobility management
MIRF
malicious ARP requests
IP networks
internet
infrastructure-based vehicular networks
handoffs
Floods
flooding attacks mitigation
Flooding Attacks
Filtering
biblio
Defining the framework for wireless-AMI security in smart grid
Submitted by BrandonB on Fri, 05/01/2015 - 8:50am
public key cryptography
Zigbee
WMN(Wireless Mesh Network)
wireless mesh Zigbee network topology
wireless mesh networks
Wireless communication
wireless AMI security
smart power grids
smart meters
Smart Grids
smart grid advanced metering infrastructure
security
public key infrastructure
AMI (Advanced Metering Infrastructure)
Power system protection
power engineering computing
PKI based digital certificate authentication
PKI
metering
intrusion detection system
Intrusion Detection
internal security attack
external security attack
computer network security
authentication
biblio
Signal fingerprinting in cognitive wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:48am
malicious attacks
wireless mesh networks
Wireless communication
wireless
telecommunication signalling
telecommunication security
spread spectrum communication
Signal to noise ratio
signal fingerprinting
security
RFF
public key cryptography
Public key
Protocols
active radiofrequency fingerprinting
Fingerprinting
DoS
denial-of-service attacks
Demodulation
Cryptographic Protocols
CRM
common-control-channel information
cognitive wireless networks
cognitive radio manager framework
cognitive radio
Cognitive
Amplitude shift keying
biblio
Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection
Submitted by BrandonB on Fri, 05/01/2015 - 8:48am
probe selection algorithm
WMN
wireless multihop networks
wireless mesh networks
Wireless communication
testing
testbed experimentation
Telecommunication standards
spread spectrum communication
security of data
security
Probes
active-probing-based network intrusion detection system
Intrusion Detection
indoor wireless mesh testbed
indoor communication
IEEE 802.11s
Equations
Bayesian model
Bayesian inference
Bayes methods
Bayes inference
AP-NIDS DogoIDS
« first
‹ previous
…
427
428
429
430
431
432
433
434
435
…
next ›
last »