Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
resilience
WSN communication protocols
wireless sensor networks
telecommunication security
tactical WSN
tactical wireless sensor networks
tactical sensor networks
specific routing protocol
sink-node vulnerability
sensor nodes
sensor networks
security
Routing protocols
Routing
Resiliency
6LoWPAN
remote sensing
reactive routing protocol
pubcrawl
privacy
modified LOADng protocol
military communication
Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol
k-anonymity
IEEE 802.15.4
IEEE 802.15 Standard
enhancing sink node anonymity
Cyber Physical Systems Security
composability
Ad hoc networks
biblio
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
sensor nodes
personal area networks
power consumption
Protocols
pubcrawl
remote server
resilience
Resiliency
resource-constrained sensors
S3K technique
Scyther security protocol verification tool
personal area network identification
sensors
Servers
session key distribution
symmetric key establishment method
telecommunication network routing
telecommunication power management
telecommunication security
trust anchor
wireless sensor networks
Cryptography
6LoWPAN wireless sensor networks
authentication
CBC mode
cipher block chaining
composability
Contiki
ContikiOS
Cooja Simulator
Cryptographic Protocols
6LoWPAN
Cyber Physical Systems Security
datagram transport layer security
DTLS
EAKES6Lo technique
Edge router
LAUP
lightweight authentication protocol
Lucky Thirteen attack
PAN ID
biblio
A Self-Healing Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:21pm
radio links
wireless sensor networks
telecommunication security
sensors
self-healing networks
self-healing key pre-distribution scheme
security
Resiliency
resilience
composability
Q-composite key scheme
pubcrawl
node compromising attacks
multiphase WSN
multiphase wireless sensor networks
Measurement
insecure communication links
Electronic mail
biblio
Security Comparison between Dynamic Static WSN for 5g Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
Power demand
WSN
wireless sensor networks
vehicle dynamics
Static Network
security
Resiliency
resilience
pubcrawl
5G
power consumption
Monitoring
Metrics
energy consumption
dynamic networks
Dynamic Network
composability
5G mobile communication
biblio
Security Comparison between Dynamic Static WSN for 5g Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:10pm
Power demand
WSN
wireless sensor networks
vehicle dynamics
Static Network
security
Resiliency
resilience
pubcrawl
5G
power consumption
Monitoring
Metrics
energy consumption
dynamic networks
Dynamic Network
composability
5G mobile communication
biblio
Security of hardware architecture, design and performance of low drop-out voltage regulator LDO to protect power mobile applications
Submitted by grigby1 on Wed, 02/21/2018 - 1:43pm
CMOS low-power
Hardware
integrated circuit
LDO
Low power SOC
Mathematical model
Network Security Architecture
Power transistors
pubcrawl
Regulators
resilience
Resiliency
security
Voltage control
wireless sensor networks
WSNs
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
biblio
Random Projection Data Perturbation Based Privacy Protection in WSNs
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
PPND algorithm
wireless sensor networks
telecommunication security
Sparse projection data perturbation
Sparse matrices
SMART algorithm
security
Resiliency
random projection data perturbation based privacy protection
pubcrawl
privacy protection requirements
privacy preserving
pre-distribution random number
Algorithm design and analysis
node privacy
Network reconnaissance
network coverage area
data traffic
data privacy protection mechanism
data privacy
Data integration
data fusion technology
data fusion algorithm
data fusion
Conferences
biblio
A Communication Security Protocol for Ubiquitous Sensor Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Metrics
wireless sensor networks
ubiquitous sensor networks
ubiquitous network system
Ubiquitous Computing Security
ubiquitous computing
telecommunication security
security
Scalability
Resiliency
Public key
pubcrawl
Protocols
privacy
Access Credential
Medical services
Logic gates
key exchange computation process
information technology
Human Factors
Human behavior
gateway
Cryptography
cryptographic access
communication security protocol
communication protocol
cipher content
authentication
biblio
Improved trustworthiness judgment in open networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Reliability
wireless sensor networks
uncertainty analysis
uncertainty
Trustworthy Systems
trustworthiness judgment
Trusted Computing
trust model
trust data
statistical trust value
statistical analysis
Software
security of data
Resiliency
collaboration
recommender systems
pubcrawl
Peer-to-peer computing
open systems
open networks
interactive success rate
Decision Making
cyber physical systems
Computational modeling
composability
collaborative recommendation mechanism
Collaborative recommendation
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »