Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Parasite Chain Attack Detection in the IOTA Network
Submitted by grigby1 on Fri, 04/14/2023 - 4:05pm
distributed ledger
Tangle
Parasite Chain
IOTA
Double-spend Attack
directed acyclic graph
dynamic graph
blockchains
Resiliency
Chained Attacks
Internet of Things
mobile computing
Image edge detection
Wireless communication
Scalability
resilience
pubcrawl
blockchain
Anomaly Detection
biblio
SMS Spam Detection Using TFIDF and Voting Classifier
Submitted by grigby1 on Fri, 02/17/2023 - 5:37pm
feature extraction
spam
Feature Selection
Message service
spam detection
HAM
Mobile SMS Spam
TFIDF
Voting Classifier
Computer hacking
Hacker
machine learning
pubcrawl
Human behavior
Metrics
Scalability
Measurement
Mobile handsets
mobile computing
biblio
An Efficient Distributed Secured Broadcast Stateless Group Key Management Scheme for Mobile Ad Hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 6:29pm
Hash functions
simulation
security
resilience
pubcrawl
Performance analysis
mobile computing
mobile ad hoc networks
interpolation
Informatics
key management
Group key management
composability
Broadcast stateless
Ad Hoc Network Security
Human behavior
Metrics
Resiliency
Scalability
pub-crawl
biblio
Performance Comparison of AODV and DSDV In Vehicular Ad Hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 6:28pm
pubcrawl
Metrics
resilience
Resiliency
composability
VANET
Reliability
vehicular ad hoc networks
Routing protocols
AODV
MANET
mobile computing
ubiquitous computing
DSDV
OMNET++
Ad Hoc Network Security
biblio
To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
Compositionality
mobile computing
Monitoring
pubcrawl
Routing
Routing protocols
manet attack prevention
Resiliency
Metrics
mobile ad hoc networks
AODV
AODV protocol
Black hole attack
data transfer
Detection and Prevention.
MANET
MANET Attack Detection
biblio
Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM)
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
MANET
MANET Attack Detection
HCIDM
Cluster Routing
CCIDM
trust
wireless networks
mobile computing
Ad hoc networks
collaboration
Compositionality
Resiliency
Metrics
pubcrawl
Routing
Intrusion Detection
Clustering algorithms
biblio
Detection Jellyfish Attacks Against Dymo Routing Protocol on Manet Using Delay Per-Hop Indicator (Delphi) Method
Submitted by aekwall on Mon, 02/07/2022 - 5:08pm
delays
Routing
information technology
Wireless communication
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
mobile computing
Routing protocols
DELPHI
DYMO
Jellyfish
MANET Attack Detection
biblio
FIFA: Fighting against Interest Flooding Attack in NDN-based VANET
Submitted by aekwall on Fri, 02/04/2022 - 10:31am
composability
Repudiation
named data networking
Interest Flooding Attack
information-centric networking
information centric networking
Floods
vehicular ad hoc networks
mobile computing
security
Human behavior
Resiliency
Metrics
pubcrawl
Wireless communication
computer architecture
VANET
biblio
An Intelligent Malware Detection and Classification System Using Apps-to-Images Transformations and Convolutional Neural Networks
Submitted by aekwall on Mon, 11/29/2021 - 2:03pm
deep learning
feature extraction
Wireless communication
pubcrawl
Scalability
Resiliency
mobile computing
malware
convolutional neural networks
static analysis
Android malware
classification
Dictionaries
signature based defense
biblio
Detection and Prevention of Blackhole Node
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
mobile computing
Topology
Throughput
Routing protocols
Routing
Resiliency
resilience
R-AODV
pubcrawl
Packet drop ratio (PDR)
NS-2.35
manet attack prevention
Metrics
MANET Attack Detection
end-to-end delay
encryption
Elliptic curve cryptography
ECC
Compositionality
Blackhole attack
Ad hoc networks
1
2
3
4
5
6
7
8
9
…
next ›
last »