Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Fault Tolerance and Security in Forwarding Packets Using Game Theory
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
price of anarchy
wireless sensor networks
wireless networks
wireless mesh networks
Waste materials
telecommunication security
telecommunication network reliability
self organized wireless network
security
Scalability
Relays
radio networks
pubcrawl
Ad hoc networks
Predictive Metrics
Nash Equilibrium
Mesh networks
Human Factors
game theory
game theoretic security
forwarding packet security
forwarding packet fault tolerance
fault tolerance
cooperation strategy
cooperation stimulation
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
security
pubcrawl
composability
wireless sensor networks
trust
self-healing
Compositionality
Computing Theory and Trust
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
illegitimate sensor nodes
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
cluster formation game
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
Computational modeling
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
security
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
biblio
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
financial markets theory
wireless sensor networks
Trusted Computing
trust diversification
Trajectory
telecommunication computing
spatially autocorrelated candidate sensors
sensors
sensor data accuracy trustworthiness
pubcrawl
Portfolios
online data cleaning
online context-aware data cleaning method
MWSN
Mobile wireless sensor networks
mobile radio
Control Theory
DTP
diversified trust portfolio
Decision Making
data imprecision
data handling
Correlation
context-aware
Conferences
Computing Theory and Trust
Compositionality
composability
cleaning
beta-trust
security
biblio
HCOBASAA: Countermeasure Against Sinkhole Attacks in Software-Defined Wireless Sensor Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
probability of false negative
wireless sensor networks
telecommunication security
software-defined wireless sensor cognitive radio network
Sinkhole attack
sink node
sensor nodes
Resiliency
resilience
pubcrawl
probability of false positive
Base stations
probability of detection
Performance Metrics
Hop Count-Based Sinkhole Attack detection Algorithm
HCOBASAA
detection algorithms
Databases
Communication system security
Cognitive Radio Security
cognitive radio
change in position
biblio
Analogous Study of Security Threats in Cognitive Radio
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless sensor networks
wireless security threat issue
Wireless communication
white space
telecommunication security
SSDF
spectrum sensing data falsification
signal detection
sensors
sensor fusion
security
Resiliency
resilience
radio spectrum management
PUE
cognitive radio
Primary user Emulation
Jamming
Interference
Fusion Techniques
fusion technique
electromagnetic spectrum band
Electromagnetic spectrum
Data integration
CRWSN
Cooperative Spectrum Sensing and Spectrum Sensing Data Falsification (SSDF)
cooperative spectrum sensing
cooperative communication
cognitive radio wireless sensor networks
Cognitive Radio Security
Cognitive Radio (CR)
biblio
Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
Resiliency
NDN
node mobility
performance tuning
Policy
Policy Based Governance
policy governance
practical adoption
Protocols
pubcrawl
resilience
Named Data Networking (NDN)
stable connections
tactical applications
tactical edge networks
tactical environments
tactical networks
transport protocols
unreliable capacity limited performance
wireless nature
wireless sensor networks
ICN
application-specific extensions
clean slate
clean slate networking approach
collaboration
communication scenario
Engines
Face
fairly stable infrastructure-based environments
Human behavior
Human Factors
Ad hoc networks
information centric networking
Information-Centric Networking (ICN)
internet
IP networks
Metrics
military communication
mobile computing
mobile military networks
named data networking
biblio
Physical Layer Security in Wireless Information and Power Transfer Millimeter Wave Systems
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
SWIPT
resilience
Resiliency
secrecy performance
secrecy probability
secure transmission performance
simulation results
simultaneous wireless information
stochastic geometry framework
reliable transmission performance
Switches
telecommunication network reliability
telecommunication security
Throughput
wireless channels
Wireless communication
wireless sensor networks
Communication system security
pubcrawl
probability
power transfer millimeter wave ultra-dense network
power transfer millimeter wave systems
physical layer security performance
physical layer security
network parameters
Millimeter-wave (mmWave)
Metrics
Information rates
energy-information coverage probability
energy coverage
effective secrecy throughput
confidential information rate
composability
biblio
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Secret free
industrial automation sensors
key establishment
key establishment processes
man in the middle attack
medical devices
Message Integrity Protection
multiple devices
multiple legitimate devices
ON OFF Keying
out-of-band channels
pairing process
physical layer security
physical-layer group message integrity
in-band message integrity verification
secure deployment
secure device bootstrapping
secure pairing
shared secrets
signal manipulation attacks
VERSE
wireless channel
wireless devices
wireless signal annihilation
wireless signal injection
Wireless Signal Manipulation Attack
wireless signal manipulations
Security by Default
Cryptographic Protocols
Internet of Things
security of data
resilience
wireless sensor networks
pubcrawl
Resiliency
Scalability
Protocols
Wireless communication
telecommunication security
message authentication
performance evaluation
Communication system security
authentication
authorisation
wireless channels
body area networks
public key cryptography
data integrity
autonomous vehicles
man-in-the-middle attacks
advanced wireless attacks
authenticated channels
bootstrapping protocol
extensive human involvement
Group Bootstrapping
hub
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »