Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Slot Assignment Algorithm Based on Hash Function for Multi-target RFID System
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
radiofrequency identification
wireless sensor networks
Throughput
telecommunication congestion control
tags collision
Tag matching
Tag group
Stability analysis
Smart tags
slot assignment algorithm
simulation
Resiliency
resilience
ALOHA algorithm
pubcrawl
object detection
Multitarget tags assignment slots algorithm
Multitarget RFID system
Multitag identification technique
Heuristic algorithms
Hash functions
Hash Function
hash algorithms
Compositionality
anti-collision algorithms
Anti-collision
biblio
Multi-Tier and Multi-Band Heterogeneous Wireless Networks with Black Hole Attacks
Submitted by grigby1 on Thu, 06/04/2020 - 11:48am
Communication system security
composability
cyber physical systems
Employment
Human Factors
immersive systems
Performance analysis
privacy
pubcrawl
resilience
Resiliency
sensors
wireless networks
wireless sensor networks
biblio
Network Layers Threats its Countermeasures in WSNs
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
security countermeasures
WSN
wormhole attack
wireless sensor networks
telecommunication security
telecommunication network reliability
Sybil attack
Sinkhole attack
selective forwarding attack
security requirements
security hazards
Blackhole attack
Scalability
Resiliency
resilience
reliable file exchange
pubcrawl
network layer threats
network layer intrusions
hello flood attack
dimensionally diffused nodes
Blackhole Attack And Hello Flood Attac
biblio
Intrusion Detection and Security System for Blackhole Attack
Submitted by grigby1 on Mon, 06/01/2020 - 3:57pm
Blackhole attack
IDS
intrusion detection system
network simulator
pubcrawl
resilience
Resiliency
Scalability
security issues
security of data
security system
telecommunication security
Wireless Sensor Network
wireless sensor networks
biblio
A Review on Internet of Things Protocol and Service Oriented Middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
middleware security
wireless sensor networks
SOA based IoT middleware
service-oriented architecture
service oriented middleware
service oriented architecture
security
Resiliency
resilience
quality of service
pubcrawl
Protocols
policy-based governance
applications development
middleware
machine-to-machine communications
IoT Protocols and IoT Security
IoT middleware
IoT dependent
interoperability
Internet of Things protocol
Internet of Things
health care
divorce application
desirable protocol
composability
biblio
Middleware Based Node Authentication Framework for IoT Networks
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
node authentication framework
wireless sensor networks
security of data
security mechanism
security
Resiliency
resilience
pubcrawl
policy-based governance
authentication
Network
middleware security
middleware
IoT networks
Internet of Things
internet
Conferences
composability
biblio
A highly accurate machine learning approach for developing wireless sensor network middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:47am
middleware security
WSNs
WSN
wireless sensor networks
wireless sensor network middleware
visualization
unsupervised learning technique
Unsupervised Learning
sensors
security problems
security of data
security
Resiliency
resilience
pubcrawl
policy-based governance
composability
middleware
malicious attacks
machine learning
learning (artificial intelligence)
intelligent middleware
Generators
generator
Generative Adversarial Networks algorithm
GANs
gan
Gallium nitride
fake data
detector
Data Transmission
confusion matrix
biblio
Architecting a Secure Wireless Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:29pm
network-on-chip connecting cores
WNoC
wireless sensor networks
Wireless communication
wireless channels
traditional wired NoC
telecommunication security
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
point-to-point multihop signaling
one-hop broadcasts
on-chip systems
Bandwidth
network-on-chip
network on chip security
network interface
multiprocessing systems
Multiaccess communication
Metrics
latency constraints
Integrated circuit interconnections
integrated circuit design
faulty wireless components
fault tolerance
entire chip
energy benefits
electrical wires
Communication system security
biblio
Machine Learning Based Novel Approach for Intrusion Detection and Prevention System: A Tool Based Verification
Submitted by aekwall on Mon, 05/11/2020 - 11:13am
authentication
unique features
proactive intrusion prevention
prevention system
power supply
multiple techniques
minimum bandwidth
limited energy
HLPSL.
AVISPA tool
AVISPA
industrial environments
WSN
intrusion prevention
formal verification
military applications
Intrusion Detection
tools
network intrusion detection
Metrics
wireless sensor networks
Wireless Sensor Network
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Protocols
Cryptographic Protocols
Servers
computer network security
biblio
Securing a Wireless Network-on-Chip Against Jamming Based Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:09am
persistent jamming attack
internal hardware Trojans
jamming attack
low-power transceivers
ML classifiers
network-on-chip communications
NoC switches
nonscalable multihop data transmission paths
On chip interconnect
On chip security
on-chip data transfer
on-chip wireless medium
denial-of-service attacks
radio transceivers
radiofrequency interconnections
random burst error correction code
Switches
switching networks
WiNoC security
wired NoC architectures
wireless interconnection
Wireless NoC
wireless NoC architectures
network on chip security
system-on-chip
telecommunication security
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Wireless communication
Metrics
machine learning
telecommunication network routing
telecommunication computing
radio networks
Scalability
DoS
Hardware Security
error correction codes
radiofrequency interference
DoS attack
Jamming
denial-of-service attack
machine learning classifier
HT
network-on-chip
data transfer security threats
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »