Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
On collision-free reinforced barriers for multi domain IoT with heterogeneous UAVs
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
collision avoidance
computer science
cyber physical systems
Human behavior
Human Factors
Internet of Vehicles
Metrics
Monitoring
pubcrawl
Resiliency
sensors
smart cities
Unmanned Aerial Vehicles
wireless sensor networks
biblio
Embedding of MRC in TM to increase the security for IoT technologies
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
wireless sensor networks
Wireless communication
TM (trust management)
sensors
security Algorithm
security
Resiliency
pubcrawl
MRC (maximum ratio diversity)
Metrics
IoT (internet of things) system
internet
embedded systems
diversity reception
composability
Application Layer
biblio
Secure and resilient scheme for data protection in unattended wireless sensor networks
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
wireless sensor networks
sensors
Security analysis
Resilient Security Architectures
Resiliency
pubcrawl
Mobile communication
Fragmentation
Data protection
Data dispersal
Cryptography
authentication
biblio
Secure routing against DDoS attack in wireless sensor network
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
pubcrawl
WSNs
wireless sensor networks
Wireless Sensor Network
UDP messages
TCP messages
sink node
sensor placement
sensor nodes
security scheme
security Algorithm
secure routing protocol
Routing protocols
Routing
Resiliency
composability
Monitoring
Metrics
message passing
IPS node
IPS
IP networks
intrusion prevention scheme
intrusion
Human behavior
DDoS Attack Prevention
DDoS Attack
computer network security
Computer crime
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
biblio
Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks
Submitted by grigby1 on Wed, 01/10/2018 - 12:21pm
Cryptography
wireless sensor networks
wireless networks
telecommunication security
security of wireless communication
Resiliency
Relays
pubcrawl
Physical layer
MIMO communication
MIMO
information theory based compromised nodes detection algorithm
information theory
array signal processing
cryptographic technique
cross-layered security approach
Cross Layer Security
cooperative sensor networks
cooperative MIMO radios
cooperative MIMO communication
cooperative communication
composability
cognitive radio networks
cognitive radio
beamforming
biblio
Geometric group key-sharing scheme using euclidean distance
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
information theoretic security
wireless sensor networks
Wireless Sensor Network
sensor network
Scalability
Resiliency
pubcrawl
Policy
multicast communication
Metrics
Internet of Things
information-theoretic security
Broadcasting
human factor
Human behavior
group key sharing
geometric group key-sharing scheme
Euclidean distance
Elliptic curve cryptography
Cryptography
computational complexity
composability
collaboration
biblio
A Trust Management Based Framework for Fault-Tolerant Barrier Coverage in Sensor Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Resiliency
wireless sensor networks
wireless senor network
trust management-based framework
TrusDet
temporal sensory output correlation
telecommunication security
telecommunication network reliability
spatial sensory output correlation
sink-level decision
sensors
sensor-level detection
Robustness
collective voting
pubcrawl
intrusion tolerance
Intrusion Detection
HC-SR501 infrared sensor
Fuses
faulty sensor recognition
fault-tolerant intrusion detection algorithm
fault-tolerant barrier coverage
Fault tolerant systems
fault tolerance
Correlation
composability
biblio
Hardware-Secured Configuration and Two-Layer Attestation Architecture for Smart Sensors
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
secured storage
configuration interface
configuration updates
dedicated secured hardware
Hardware Security
hardware-secured configuration
Intelligent sensors
Secure storage
secured configuration protocol
configuration
security updates
Smart Sensor
smart sensors
two-layer attestation architecture
two-layer configuration attestation process
usability
sensor security
composability
Metrics
attestation
pubcrawl
Resiliency
Human behavior
Human Factors
Internet of Things
Software Architecture
security
Protocols
security of data
Hardware
computer architecture
telecommunication security
wireless sensor networks
confidential configuration data
biblio
Integration of wireless sensor network and Web of Things: Security perspective
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
Logic gates
sensor security
WSN integration
WoT security issue
Web of Things
smart thing
Sensor
security perspective
Security Challenge
Internet of Things vision
WSN
security threats
control systems
wireless sensor networks
Wireless Sensor Network
security
Wireless communication
computer network security
Computer crime
data privacy
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »