Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
pubcrawl
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network reliability
sensor security
selective forwarding attacks
selective forwarding attack
security attacks
security
Routing protocols
Routing
robust recovery schemes
Resiliency
reliable transmission scheme
cluster head
Protocols
Predictive Metrics
network coding
Metrics
malicious security attacks
low energy adaptive clustering hierarchy
LEACH protocol
Human behavior
encoding
diversity coding
delays
cyber physical systems
composability
cluster routing protocols
biblio
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
heavy-weight detection mechanisms
bio-modality detection sensors
bio-modality detection systems
bio-modality spoofing
Biomedical imaging
Feature Selection
fingerprint identification
fog based architectures
fog node
fog-based security application
binarized multifactor cognitive detection
image synthesis
Iris recognition
MCPS
resource-constrained sensors
secure user authentication
Sensor management
spoofing bio-identifiable property
spoofing detection
cyber-physical systems
telecommunication security
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Metrics
authentication
security of data
sensors
biometrics (access control)
Human Factors
face recognition
Fog computing
Ensemble Learning
medical cyber-physical systems
multifactor authentication
biblio
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs
Submitted by grigby1 on Tue, 01/21/2020 - 11:50am
authentication
dynamic credential
exponentiation
forward secrecy
key agreement
pubcrawl
resilience
Resiliency
Scalability
wireless sensor networks
biblio
Decentralized Multi-Sensor Scheduling for Multi-Target Tracking and Identity Management
Submitted by grigby1 on Tue, 01/21/2020 - 11:38am
pubcrawl
wireless sensor networks
telecommunication scheduling
target tracking
target information
state estimation
sensor fusion
sensor dynamic constraints
Scalability
resilience
closed-loop multitarget tracking algorithm
primary sensor
multiple secondary sensors
identity management method
identity management algorithm
Identity management
Human behavior
Decision Making
decentralized multisensor scheduling
biblio
A high-throughput fully digit-serial polynomial basis finite field \$\textbackslashtextGF(2ˆm)\$ multiplier for IoT applications
Submitted by aekwall on Mon, 01/20/2020 - 11:49am
Clocks
computer architecture
digit-level architecture
Elliptic curve cryptography
exponentiation
finite field arithmetic
Hardware
Internet of Things
pubcrawl
redundant basis
Resiliency
Scalability
wireless sensor networks
biblio
An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
gaussian distribution
specific internal attacks
special protocol
RPL-based internet
RPL networks
resource-constrained nature
networking
Neighbor Attack
Low-Power
lossy networks
large-scale networks
human interaction
everyday life
DIS Attack
Communications
anomaly-based lightweight Intrusion Detection System
IoT
6LoWPAN
RPL protocol
internet
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
Resiliency
telecommunication security
Internet of Things
Monitoring
IDS
computer network security
RPL
biblio
Data Acquisition Network and Application System Based on 6LoWPAN and IPv6 Transition Technology
Submitted by aekwall on Mon, 01/13/2020 - 12:04pm
personal area networks
wide area networks
tunnel
rich IPv6 address
multiservice data storage
low-power wide-area network wireless communication technology
IPv6
IPv4 address exhaustion
internal sensor network
device access management
data acquisition network
application system
affair data service
actual uploaded river quality data
6to4 tunnel
6to4
Monitoring
internetworking
data packet
sensors
6LoWPAN
data acquisition
internet
Routing
wireless sensor networks
composability
pubcrawl
Resiliency
Protocols
Servers
IP networks
biblio
Enhanced Simulation Framework for Realisation of Mobility in 6LoWPAN Wireless Sensor Networks
Submitted by aekwall on Mon, 01/13/2020 - 12:04pm
6LoWPAN
shortest routes
personal area networks
mobility management (mobile radio)
Mobility
Handover
enhanced simulation framework
6LoWPAN wireless sensor networks
QoS
sensors
quality of service
security improvement
IoT
telecommunication network routing
simulation
wireless sensor networks
composability
pubcrawl
Resiliency
Protocols
performance evaluation
Internet of Things
computer network security
biblio
Detection of False Data in Wireless Sensor Network Using Hash Chain
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
hash chain
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
sensor nodes
Resiliency
resilience
pubcrawl
Mathematics
Human behavior
Hostile Environment
authentication
False Data Injection
false data filtering schemes
False Data Detection
encryption
data integrity
cyber physical systems
Cryptography
composability
bogus data
Base stations
biblio
Game theoretic approach towards intrusion detection
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
Games
game theoretic security
probe attacks
NSLKDD dataset
game model
dominated strategies elimination method
Dominated Strategies
game theoretic approach
Predictive Metrics
Human Factors
Probes
Intrusion Detection
wireless sensor networks
pubcrawl
network security
data traffic
game theory
Protocols
Scalability
intrusion detection system
security of data
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »