Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication techniques
biblio
Area Constraint Aware Physical Unclonable Function for Intelligence Module
Submitted by grigby1 on Mon, 12/09/2019 - 1:01pm
Hardware
Table lookup
security of IoT device
security countermeasures
PUF performance evaluation
pubcrawl
physical unclonable functions
Physical Unclonable Function
NN
Neurons
neural network
IoT devices
intelligence module
Hardware Security
area constraint aware physical unclonable function
Hamming distance
field programmable gate arrays
edge computing
Cryptography
computational intelligence
Compositionality
composability
circuit area
authentication techniques
authentication
Artificial Neural Networks
artificial intelligence technology
area constraint aware PUF
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
Detection and Prevention of Routing Attacks in Internet of Things
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
MatLab simulation
Trusted Computing
smart objects
smart network
Sinkhole
Selective Forwarding
security
RPL
routing attack prevention
routing attack detection
Routing attack
Routing
Resiliency
pubcrawl
Protocols
message authentication
6LoWPAN
Key Match Algorithm
IoT based network
Intrusion Detection System (IDS)
intrusion detection system
Intrusion Detection
Internet of Things
internet
encryption techniques
Cryptography
composability
Clustering algorithms
Cluster-Based Algorithm
CBA algorithm
authentication techniques