Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Modelling, analysis and design of active queue management to mitigate the effect of denial of service attack in wired/wireless network
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Metrics
wireless sensor networks
wireless network
wired network
Time delay
telecommunication congestion control
TCP/AQM system
stochastic systems
stabilizing control syntheses
stability
Router Systems Security
Resiliency
resilience
queue router attacks
pubcrawl
active queue management
Markovian jump linear system
Linear systems
Guaranteed cost approach
feedback control
distributed denial of service attacks
denial of service attack
delays
delay-dependent conditions
DDoS Attacks
Congestion Control
computer network security
closed-loop system
closed loop systems
AQM security
biblio
Secure estimation for intelligent connected vehicle systems against sensor attacks
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
Acceleration
Security Risk Estimation
state estimator
sensor attacks
Sensor attack
intelligent control
Intelligent connected vehicles
intelligent connected vehicle system
Channel estimation
closed loop systems
secure estimation
vehicular ad hoc network
telecommunication control
wireless channels
connected vehicles
road vehicles
estimation
Human Factors
Stability analysis
cyber-attacks
Metrics
Wireless communication
Communication system security
vehicular ad hoc networks
telecommunication power management
wireless sensor networks
pubcrawl
Resiliency
telecommunication security
Scalability
biblio
Switching Topology for Resilient Consensus Using Wi-Fi Signals
Submitted by grigby1 on Mon, 03/02/2020 - 1:38pm
Topology
societal integration
Switches
switching signal
switching topology
Sybil attack
sybil attacks
telecommunication network topology
telecommunication security
telecommunication switching
security
true graph
untrustworthy agents
untrustworthy transmissions
Wi-Fi signals
wireless channels
Wireless communication
wireless LAN
wireless sensor networks
wireless transmissions
multirobot team security
Communication system security
composability
connected topology
graph theory
initial topology
legitimate agents
Metrics
multi-robot systems
multiagent consensus
arbitrary malicious node values
network topology
physical networks
physical properties
probability
pubcrawl
resilience
Resiliency
resilient consensus
biblio
Joint Sybil Attack Prevention and Energy Conservation in Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
composability
energy conservation
hierarchical routing
Metrics
network lifetime
pubcrawl
resilience
Resiliency
sybil attacks
wireless sensor networks
biblio
ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
MDP
adaptive neuro fuzzy inference system
ANFIS
complex security
FIS learning rules
forwarding node
malicious node
marine communication
MATLAB
UWSN
resource constraint behaviour
sensor node
trust behaviour
trust management model
trusted node
Underwater Wireless Sensor Networks
Underwater Networks
Routing
Scalability
data privacy
telecommunication security
Resiliency
pubcrawl
wireless sensor networks
location privacy
privacy
Intrusion Detection
Metrics
authentication
Data mining
information and communication technology
Markov Decision Process
Markov processes
Trust management
biblio
Physical Layer Security of an Amplify-and-Forward Energy Harvesting-Based Mixed RF/UOW System
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
optical fiber communication
fixed-gain amplification
legitimate destination node
malicious eavesdropper
maximal ratio combining
mixed RF-UOWC system
mixture Exponential-Gamma fading
MRC
multiantenna AF relay device
Nakagami channels
Nakagami-m fading
fading channels
optical links
radio-frequency system
relay node
RF link
S-R hop
secrecy outage probability
single-antenna source node
underwater optical wireless communication
UOWC link
Underwater Networks
error statistics
telecommunication security
Radio frequency
Resiliency
pubcrawl
batteries
wireless sensor networks
telecommunication power management
Metrics
Signal to noise ratio
probability
Scalability
antenna arrays
physical layer security
Relays
relay networks (telecommunication)
telecommunication network reliability
amplify and forward communication
amplify-and-forward energy harvesting
diversity reception
dual-hop system
energy harvesting
biblio
Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
machine learning techniques
WSN
wireless sensor networks
threat vectors
Support vector machines
security threats
security
Routing protocols
pubcrawl
privacy
Metrics
Measurement
attack signature
learning (artificial intelligence)
intrusion detection-and-prevention system
intrusion detection system
hardware resources
DoS attacks
denial-of-service attack
denial of service
decision trees technique
Decision trees
computer network security
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist
biblio
Balanced Load Clustering with Trusted Multipath Relay Routing Protocol for Wireless Sensor Network
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
quality of service
WSN
wireless sensor networks
Wireless Sensor Network
wireless channels
trusted multipath relay routing
trust values
Trust Routing
telecommunication security
Scalability
Routing protocols
relay node
relay networks (telecommunication)
balanced load clustering
pubcrawl
pattern clustering
network simulation software
multipath trust
multipath channels
malicious activity trusted multipath relay routing protocol
Hybrid medium access control (HMAC)
Energy Efficiency
energy consumption
composability
balanced load clustering concepts
biblio
A Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal
Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
Scalability
Mobile Ad-hoc Network host
mobile radio
packet count
privacy
Protocols
pubcrawl
Resiliency
route detection
route discovery
Routing
Routing protocols
Mobile Ad-Hoc Network (MANET)
Secure Autonomic Mobile Ad-hoc Network
telecommunication network routing
trust administration approach
Trust estimation dependent
trust management approach
trust organization approaches
Trust Routing
trusted path
trusted Routing proposal
wireless sensor networks
Informatics
Adaptive Information Dissemination (AID)
attacker
composability
Compositionality
data privacy
Data Transmission
different occurrences ease
direction-finding procedure
fuzzy trust approach
hybrid approach
inaccessible systems
Adaptive Information Dissemination
information dissemination
internet
Internet of Things
Internet of Things (IoT)
Internet of Things gadgets
IoT
MANET Attack Detection
manet privacy
Metrics
mobile ad hoc networks
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »