Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobility
biblio
Robust Implementation of ICN-based Mobile IoT for Next-Generation Network
Submitted by grigby1 on Fri, 08/25/2023 - 10:58am
Internet of Things
Optimization methods
pubcrawl
resilience
Resiliency
Scalability
Next generation networking
Information Centric Networks
Data Security
smart cities
Mobility
information-centric networking
Information-Centric Networking (ICN)
naming scheme
biblio
An Optimized Mobility Management Framework for Routing Protocol Lossy Networks using Optimization Algorithm
Submitted by grigby1 on Tue, 12/06/2022 - 2:50pm
LPWN
Topology
Throughput
RPL
Routing protocols
Routing
network topology
Mobility
metaheuristics
6LoWPAN
LPLN
LLN
IoT
delays
pubcrawl
composability
resilience
Resiliency
biblio
A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network
Submitted by grigby1 on Fri, 08/26/2022 - 11:23am
Online banking
SM2-CSA
SM2 Algorithm
Cooperative-Signature Algorithm
Teleworking
Computational efficiency
Mobility
Concurrency
Elliptic curves
digital signature
security
Mobile handsets
Complexity theory
Metrics
sensors
composability
Resiliency
resilience
pubcrawl
biblio
Introducing Mobility Metrics in Trust-based Security of Routing Protocol for Internet of Things
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
Security by Default
Internet of Things
Linear programming
Measurement
Metrics
mobile nodes
Mobility
pubcrawl
Routing
Routing protocols
RPL
security
Security Metrics
smart cities
Smart homes
trust
biblio
RPL Assessment using the Rank Attack in Static and Mobile Environments
Submitted by grigby1 on Tue, 02/16/2021 - 1:41pm
energy consumption
Damage Assessment
Static environment
rank attack
Mobility
mobile environment
Informatics
Technological innovation
RPL
security
Measurement
network topology
Topology
Resiliency
resilience
pubcrawl
IoT
biblio
FGAC-NDN: Fine-Grained Access Control for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 3:54pm
Mobility
telecommunication network routing
specific user
Servers
Scalability
Resiliency
resilience
Receivers
pubcrawl
promising information-centric networking architectures
potential receivers
network architecture
named data networking
Named Data Network Security
named data network
Access Control
internet
Industries
Human behavior
fine-grained access control mechanism
fine-grained access control
FGAC-NDN
desired file
desired content
DBDH assumption
data confidentiality
computer science
cache storage
Bilinear Pairing
authorisation
biblio
On Pending Interest Table in Named Data Networking based Edge Computing: The Case of Mobile Augmented Reality
Submitted by aekwall on Mon, 03/02/2020 - 12:29pm
Human Factors
Ubiquitous Computing Security
remote computation
PIT expiry time
pending interest table
NDN based EC
Mobility
mobile augmented reality
latency
interest satisfaction rate
host centric IP architecture
distributed computation
storage resources
augmented reality
named data networking
security
edge computing
internet
Metrics
pubcrawl
Resiliency
computer architecture
mobile computing
Task Analysis
Internet of Things
Scalability
IP networks
Cloud Computing
security of data
biblio
Enhanced Simulation Framework for Realisation of Mobility in 6LoWPAN Wireless Sensor Networks
Submitted by aekwall on Mon, 01/13/2020 - 12:04pm
6LoWPAN
shortest routes
personal area networks
mobility management (mobile radio)
Mobility
Handover
enhanced simulation framework
6LoWPAN wireless sensor networks
QoS
sensors
quality of service
security improvement
IoT
telecommunication network routing
simulation
wireless sensor networks
composability
pubcrawl
Resiliency
Protocols
performance evaluation
Internet of Things
computer network security
biblio
A data protection model for fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog-based privacy-aware role based access control
security of data
security
Scalability
Resiliency
region-based trust-aware model
RBTA model
pubcrawl
Mobility
IoT
Internet of Things
FPRBAC
Access Control
fog security
fog location
Fog computing
edge computing
Data Security
data protection model
Data protection
Data models
Computational modeling
Cloud Computing
biblio
A comparison of migration and multihoming support in IPv6 and XIA
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
quality of service
Mobility
mobility anchor point
mobility management (mobile radio)
multihomed hosts
multihoming
optimization
protocol messages
Protocols
pubcrawl
mobile radio
Resiliency
resource allocation
Routing
Routing protocols
telecommunication network routing
telecommunication security
wireless LAN
XIA
XIA Migration Protocol
IP networks
client mobility
collaboration
composability
computer network management
fault tolerance
flow migration support
flow-level migration
heavy-weight protocol
internet
allocative efficiency
IPv6 address
IPv6 multihoming solutions
ipv6 security
Metrics
Mobile communication
mobile computing
Mobile IPv6
Mobile IPv6 Enhanced Route Optimization
1
2
3
next ›
last »