Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed network
biblio
An Intelligent Mechanism for Sybil Attacks Detection in VANETs
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
telecommunication computing
user privacy information
SyDVELM mechanism
Sybil Attacks.
fixed road-side components
Extreme Machine Learning
extreme learning machine
Acceleration
Scalability
distributed network
telecommunication network topology
Complexity theory
feedforward neural nets
VANET
data privacy
machine learning
sybil attacks
Metrics
vehicular ad hoc networks
VANETs
Sybil attack detection
privacy
composability
pubcrawl
Resiliency
security
data integrity
telecommunication security
biblio
Scalable Distributed Random Number Generation Based on Homomorphic Encryption
Submitted by aekwall on Mon, 03/16/2020 - 10:40am
Metrics
verifiable random functions
verifiable random function
scalable verification
scalable distributed random number generation
Scalability
Resiliency
random number generation
random key generation
random beacons
publicly-verifiable randomness
public key cryptography
pubcrawl
Predictive Metrics
blockchain based applications
mathematical operations
Human behavior
Homomorphic encryption
encrypted data
elliptic curve multiplications
Elliptic curve cryptography
distributed network
distributed ledgers
decentralized schemes
Cryptographic Protocols
Compositionality
blockchain context
biblio
Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network
Submitted by aekwall on Mon, 01/20/2020 - 12:12pm
trustless network
Hash functions
initial trust setup phase
interactive zero knowledge proof
post quantum attacks
PoW
secure digital service payments
SHA3-finalists
tokenized assets
trusted third party
financial transactions
TTP
Witness Indistinguishability
Zcash
zero knowledge proof
zero knowledge proof method
ZKSNARK
ZKSTARK
zero trust
cryptocurrencies
Scalability
data confidentiality
Cryptographic Protocols
Resiliency
pubcrawl
policy-based governance
bitcoin
blockchain
security of data
smart contracts
multiparty computation
Proof-of-work
distributed network
Human Factors
blockchain ecosystem
enterprise applications
fair exchange
biblio
A Multi-layered Outlier Detection Model for Resource Constraint Hierarchical MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
MANET Attack Detection
security dimensions
resource constraint hierarchical MANET
Resiliency
quality-of-service parameters
quality of service
QoS
pubcrawl
Outliers
outlier minimum improvements
novel multilayered outlier detection algorithm
network performance
multilayered outlier detection model
mobile ad hoc networks
Metrics
ad hoc communication MANET
layered architecture
inliers
high security level
hierarchical similarity metric
hierarchical categorized data
fixed infrastructure
Dynamic Network
distributed network
density-based clustering
decentralized network
Data collection
data analysis
composability
Attack detection
biblio
Kalman Filter with Diffusion Strategies for Detecting Power Grid False Data Injection Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 12:33pm
security of data
power grid states estimation
power grid states measurement
power system measurement
power system security
power system state estimation
pubcrawl
resilience
Resiliency
power grid false data injection attacks
sensor networks
sensor readings
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
state estimation models
electronic power grid
Computer crime
control system signals
Detectors
diffusion Kalman filter
diffusion strategies
distributed estimation models
distributed Kalman filtering
distributed network
Compositionality
estimation
estimation theory
Human behavior
Human Factors
Kalman filters
Meters
power engineering computing