Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective
Submitted by grigby1 on Wed, 08/11/2021 - 11:58am
Mobile Applications
wireless sensor networks
Software Engineering for Mobile
Software
security
Secure Software Development
resilience
pubcrawl
pervasive computing
mobile health
Pervasive Computing Security
Medical services
iOS Security
faces
Empirical Software Engineering
composability
Metrics
Human Factors
Scalability
Resiliency
biblio
Implementing Security and Trust in IoT/M2M using Middleware
Submitted by grigby1 on Mon, 08/02/2021 - 3:21pm
composability
information security
internet
IoT
M2M
machine-to-machine communications
middleware
policy-based governance
Protocols
pubcrawl
resilience
Resiliency
security
sensors
standards
wireless sensor networks
biblio
Direct Trust-based Detection Algorithm for Preventing Jellyfish Attack in MANET
Submitted by aekwall on Mon, 08/02/2021 - 3:11pm
MANET Attack Detection
wireless sensor networks
Throughput
security
Resiliency
pubcrawl
mobile ad hoc networks
Metrics
MANET security
manet attack prevention
MANET
Jellyfish Attack
Direct Trust based Detection.
delays
cyber security
Conferences
Compositionality
Aerospace electronics
biblio
Mutation Testing to Validate Networks Protocols
Submitted by grigby1 on Wed, 07/28/2021 - 8:47am
ad-hoc networks
Communication system security
Complexity theory
Computing Theory
Metrics
Mutation testing
pubcrawl
Routing
Routing protocols
Security Metrics
Test case quality
testing
Time factors
wireless networks
wireless sensor networks
biblio
Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 2:57pm
pubcrawl
wireless sensor networks
Underwater Networks
Topology
security
Scalability
Routing
Resiliency
resilience
Computational modeling
Open Source Software
Metrics
malicious node
localization
Impersonate
Hash functions
delays
Cyber Physical System
biblio
Role of Ubiquitous Computing and Mobile WSN Technologies and Implementation
Submitted by aekwall on Wed, 07/07/2021 - 4:46pm
secure communication
Resiliency
Metrics
Scalability
pubcrawl
Ubiquitous Computing Security
ubiquitous computing
Smart Home
Smart City
security
Mobile wireless sensor networks
mobile ad hoc networks
military computing
Games
data privacy
wireless sensor networks
Human Factors
Monitoring
biblio
RETIS – Real-Time Sensitive Wireless Communication Solution for Industrial Control Applications
Submitted by grigby1 on Wed, 06/30/2021 - 3:28pm
pubcrawl
wireless sensor networks
wireless feedback
Wireless communication
URLLC
Ultra reliable low latency communication
TFDMA
standards
security
RETIS
Resiliency
resilience
Automatic control
Protocols
Peer-to-peer computing
MIMO
Metrics
low latency wireless communication
industrial wireless communication
forward error correction
fast system control
composability
Communication system security
biblio
Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT
Submitted by aekwall on Mon, 06/28/2021 - 12:37pm
orchestration
wireless sensor networks
tools
security services
Scalability
Resiliency
pubcrawl
performance evaluation
Performance
Fog computing
IoT
IDPS
fog nodes
Fog Computing and Security
edge computing
Containers
computer architecture
security
biblio
Trust and Packet Loss Aware Routing (TPLAR) for Intrusion Detection in WSNs
Submitted by aekwall on Mon, 06/28/2021 - 12:32pm
computational intelligence
false trust
residual energy
MDR
FPR
Buffer Capacity
WSNs
Packet loss
Energy states
Intrusion Detection
Computational modeling
Routing
wireless sensor networks
policy-based governance
pubcrawl
Resiliency
Scalability
biblio
Trust Evaluation for Securing Compromised data Aggregation against the Collusion Attack in WSN
Submitted by aekwall on Mon, 06/28/2021 - 12:31pm
network lifetime
false trust
tree
magnetic heads
Routing
Wireless Sensor Network
Base stations
cluster
sensors
base station
Scalability
Clustering algorithms
wireless sensor networks
data aggregation
policy-based governance
pubcrawl
Resiliency
security
architecture
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »