Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
A Secure Identity-based Deniable Authentication Protocol for MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
mobile ad hoc networks
manet privacy
secure identity-based deniable authentication protocol
identity-based cryptosystem
identity-based cryptography
IBDA protocol
heavy computational communication overhead
Deniable authentication
Bilinear Pairing
adequate security
mobile nodes
Compositionality
mobile devices
elliptic curve
mobile ad hoc network
mobile computing
Cryptography
MANET
Elliptic curves
Elliptic curve cryptography
public key cryptography
mobile radio
Ad hoc networks
message authentication
authentication
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
A Security System Using Deep Learning Approach for Internet of Vehicles (IoV)
Submitted by grigby1 on Mon, 11/02/2020 - 12:09pm
pubcrawl
Unsupervised Learning
supervised learning
spectrum utilization
Smart Spectrum Utilization
smart offices
Smart Environments
smart cities
security threats
security of data
secure applications
Resiliency
resilience
reliable services
reliable communication services
connected vehicles
neural nets
mobile computing
Metrics
learning (artificial intelligence)
IoV security system
IoT
Internet of Vehicles
Internet of Things
Human Factors
deep learning methodology
deep learning approach
deep learning
critical V2X infrastructures deployment
connected vehicles communication
biblio
Cyber security standards and issues in V2X communications for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 12:08pm
standardisation bodies
pubcrawl
resilience
Resiliency
security issues
security of data
smart power grids
standardisation
standardisation approaches
mobile radio
standardisation organisations
telecommunication security
Telecommunication standards
V2X
Vehicles significant developments
vehicular communication security
Vehicular Communication Systems
Human Factors
ad-hoc type network
compromised vulnerabilities
connected vehicles
current V2X communications
cyber security
cyber security standards
design
DSRC
Ad hoc networks
international standards
internet
Internet of Vehicles
ITS
ITS environment
Metrics
mobile computing
biblio
A Network Model for Internet of vehicles based on SDN and Cloud Computing
Submitted by grigby1 on Mon, 11/02/2020 - 12:08pm
network model
vehicular mobile Internet
vehicular ad hoc networks
VANET evolution
software defined networking
Software Defined Network
smart object
security
SDN
Resiliency
resilience
pubcrawl
powerful multisensors platform
authentication
mobile computing
Metrics
intra-vehicle network
Internet of Vehicles
Internet of Things
internet
inter-vehicle network
Intelligent vehicles
Human Factors
cooperative communication
conventional vehicle network
Cloud Computing
biblio
Trajectory-Based Task Allocation for Crowd Sensing in Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 12:08pm
Conferences
crowd sensing
Human Factors
Intelligent systems
Internet of Things
Internet of Vehicles
Metrics
minimal-cover problem
mobile computing
pubcrawl
resilience
Resiliency
robots
spatiotemporal availability
task allocation
trajectory-based task allocation scheme
biblio
Security Checking Experiments with Mobile Services
Submitted by grigby1 on Mon, 11/02/2020 - 11:39am
mobile services
software security
software behavior
Software
security of data
security checking experiments
security checking
security
Scalability
pubcrawl
program verification
Androids
mobile computing
JPF-mobile
Java Path Finder verifier
Java
input/output parameters
i/o systems security
i-o systems security
Humanoid robots
Electron devices
automata
biblio
Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
mobile computing
telecommunication security
security
Resiliency
resilience
pubcrawl
policy based security
policy based approach
ns 2
mobile nodes
authorization
mobile ad hoc networks
mobile ad hoc network
Metrics
messages dissemination
MANETs
manet privacy
data privacy
Compositionality
biblio
Anonymous Routing Protocols in MANETs, a Security Comparative Analysis
Submitted by grigby1 on Thu, 10/29/2020 - 11:58am
mobile ad hoc networks
telecommunication security
special type
self organized fashion
security comparative analysis
Routing protocols
Routing
Resiliency
resilience
pubcrawl
private routing protocols
privacy
performance capabilities
mobile computing
Ad hoc networks
mobile ad hoc network
military environments ones
Metrics
MANETs
manet privacy
MANET
fixed infrastructure
Cryptography
Compositionality
communication secrecy
civil environments ones
anonymous routing protocols
anonymous routing
biblio
Anatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Technology management
MANET Attack Detection
security attack
portable hubs
performance measure techniques
Packet loss
network parameters
mobile hubs
mobile ad-hoc network
MANETSs
inactive attack
Dynamic attack
detection anatomization
decentralized validation
security
mobile computing
automation
mobile ad hoc networks
MANETs
Flooding Attacks
Compositionality
Routing protocols
Ad hoc networks
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
privacy
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
malware family classification
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
invasive software
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
Android Malware Detection
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »