Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
OSAP: Optimal-cluster-based source anonymity protocol in delay-sensitive wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:47pm
network traffic
wireless sensor networks
wireless networks
telecommunication traffic
telecommunication security
source anonymity
security
real event report latency
Protocols
OSAP
optimal cluster based source anonymity protocol
network traffic reduction
Base stations
mobile computing
Mobile communication
global attacker
fake packet injection
event source location privacy
event source anonymity
delays
delay sensitive wireless sensor networks
data privacy
cluster-based wireless sensor network
challenging attack model
biblio
An energy-efficient routing technique for privacy preservation of assets monitored with WSN
Submitted by BrandonB on Mon, 05/04/2015 - 1:46pm
phantom source
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication power management
Routing protocols
Routing
privacy preservation
privacy
Phantoms
asset monitoring
phantom node
Monitoring
fake packet injection technique
energy efficient routing technique
energy conservation
endangered species monitoring
delays
data privacy
Base stations
base station
biblio
Inspecting the Ways of Source Anonymity in Wireless Sensor Network
Submitted by BrandonB on Mon, 05/04/2015 - 1:45pm
adversarial assumptions
anonymity
coding theory
Communication Systems
event source anonymity
LSB steganography technique
network traffic
persistent dummy traffic
source location privacy
statistical test
Steganography
telecommunication traffic
Wireless Sensor Network
wireless sensor networks
biblio
Privacy preserving and anonymity in multi sinks wireless sensor networks with master sink
Submitted by BrandonB on Mon, 05/04/2015 - 1:42pm
privacy
wireless sensor networks
telecommunication security
telecommunication network routing
switching routing method
sink anonymity
Protocols
privacy preserving
privacy anonymity
anonymity
powerful base station
network topology
multisinks wireless sensor networks
Multi sinks
master sink
layer encryption
Label switching
encryption
biblio
Analyzing active probing for practical intrusion detection in Wireless Multihop Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:49am
active-probing-based network intrusion detection system
Ad hoc networks
Communication system security
frequency hop communication
Intrusion Detection
Routing protocols
security of data
testing
Wireless communication
wireless mesh network
wireless mesh networks
wireless multihop networks
wireless sensor networks
biblio
Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
Submitted by BrandonB on Fri, 05/01/2015 - 9:47am
Smart Grids
network performance
network resiliency improvement
plant-generation local area networks
Protocols
SAE
security attacks
security protocols
simultaneous authentication-of-equals
Smart Grid
smart grid mesh network security enhancement
neighborhood area networks
smart power grids
substation local area networks
Substations
trees (mathematics)
wireless LAN
wireless local area networks
wireless mesh networks
wireless sensor networks
WLAN
efficient mesh security association
Computer crime
computer network performance evaluation
computer network security
cost-ef- fective communications
Cryptographic Protocols
cyber attack
denial-of-service attack model
distributed mesh sensor networks
dynamic key distribution strategy updating
authentication
EMSA
HAN
home area networks
home networks
IEEE 802.11s
Logic gates
Merkle tree 4-way handshaking scheme
Mesh networks
NAN
biblio
Intelligent wall mounted wireless fencing system using wireless sensor actuator network
Submitted by BrandonB on Fri, 05/01/2015 - 9:43am
wireless camera
multihop routing
multilevel detection mechanism
radio transceivers
safety systems
Software
telecommunication computing
telecommunication network routing
wall mounted wireless intrusion detection system
Monitoring
Wireless communication
wireless mesh network
wireless mesh networks
wireless sensor actuator network
Wireless Sensor Network
wireless sensor networks
Zigbee
intelligent wall mounted wireless fencing system
Cameras
cellular radio
central control station
Communication system security
electronic messaging
GSM modem
IEEE 802.15.4
IEEE 802.15.4 protocol
active RFID
Intrusion Detection
intrusion software
IR based intrusion detection system
IR based perimeter protection
IR transceiver module
microwave based intrusion detection
microwave sensor technology
biblio
Security analysis of secure data aggregation protocols in wireless sensor networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:29am
Protocols
WSN lifetime
WSN
wireless sensor networks
wireless sensor network lifetime
telecommunication security
SRDA protocol
SRDA
secure reference-based data aggregation protocol
secure data aggregation protocol
authentication
Peer-to-peer computing
ESPDA protocol
ESPDA
energy-efficient and secure pattern-based data aggregation protocol
Energy Efficiency
deep security analysis
Data aggregation protocol
Cryptography
cluster-based WSN
biblio
CorteXlab: A facility for testing cognitive radio networks in a reproducible environment
Submitted by BrandonB on Fri, 05/01/2015 - 8:06am
Minus
wireless sensor networks
universal software radio peripherals
testing facility
testing
software radio
software defined radio
SensLAB
SDR nodes
reproducible environment
PicoSDR nodes
Orbits
open-source toolkit GNU Radio
Nutaq
National Instruments
cognitive radio
MIMO
IoT-Lab wireless sensor nodes
Internet of Things
Interference
Hikob
field programmable gate arrays
electromagnetically shielded room
electromagnetic shielding
CorteXlab facility
controllers
controller
complex multinode cognitive radio scenarios
complex heterogeneous system scenarios
cognitive radio networks
biblio
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks
Submitted by BrandonB on Fri, 05/01/2015 - 7:59am
malware propagation model
WSN
wireless sensor networks
traditional epidemic theory
telecommunication security
telecommunication control
sleep mode
Silicon
sensor node characteristics
saddle-point
overall cost minimization
optimal dynamic strategy
optimal control problem
malware-defense differential game
malware propagation prevention
bang-bang control
Malware propagation
malware
invasive software
Grippers
Games
epidemic theory
Differential Games
differential game-based strategy
Differential game
differential equations
decision-making problem
control systems
bang-bang controls
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
next ›
last »