Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
quality-of-service constraints
Yices SMT Solver
Trust Routing
SMT-LIB language
SMT-LIB
security
secure routing protocol
Scalability
Routing protocols
Routing Protocol
routing functions
Routing
Resiliency
resilience
requirement models
requirement constraints
Adaptation models
quality of service
QoS constraints
pubcrawl
network topology
mobile nodes
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
MANET
formal verification
formal modelling
composability
adaptive routing protocol
biblio
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
RPL protocol
pubcrawl
resilience
Resiliency
Routing
routing protocol for low-power and lossy networks
Routing protocols
routing security
RPL
power aware computing
Scalability
stolen identities
Sybil attack
SybM
Topology
Trust Routing
trust-based intrusion detection system
IoT security
computer network performance evaluation
computer network security
control overhead
energy consumption
fake control messages
Internet of Things
Internet of Things applications
IoT
composability
mobile computing
mobile nodes
mobile sybil attacks
network topology
packet delivery
performance evaluation
physical adversary
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs
biblio
False Data Injection Attacks Targeting DC Model-Based State Estimation
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
power system state estimation
Transmission line measurements
Topology
state variable target
state estimation
specific targets
smart power grids
Smart Grid
security of data
secure operation
Scalability
Resiliency
resilience
Q measurement
pubcrawl
pre-specified meter target
adversary
power system security
power engineering computing
network topology
Metrics
Meters
Manganese
Human behavior
grid operator
false data injection attack
economic operation
DC model
cyber-attacks
attacking vector
Adversary Models
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
Individually-Secure Multi-Source Multicast
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
network links
zero mutual information
telecommunication security
SMSM
security
secure MSM
Resiliency
resilience
Reliability
rate region
pubcrawl
nonsecure MSM
network topology
coding theory
network coding
Mutual information
multicast communication
Metrics
individually-secure multisource multicast
encoding
eavesdropper
cut-set bound
Cryptography
Compositionality
common secure model
biblio
A Security Routing Protocol for Internet of Things Based on RPL
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
RPL network security
Resiliency
route discovery phase
Routing
Routing attack
routing attacks
Routing protocols
routing recurity
RPL based security routing protocol
pubcrawl
security
security problems
security routing protocol
telecommunication network topology
telecommunication security
test network
test prototype network
Topology
IP networks
collaboration
composability
data routing
flexible topological structure
hierarchical clustering network topology
intelligent device
Internet of Things
IoT
backup path
ipv6 security
lightweight IPv6 network routing protocol
Logic gates
M-RPL network
Metrics
multipath routing
network topology
biblio
On the security of SDN-enabled smartgrid systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart grid security
Scalability
SDN
SDN networks
SDN-enabled smartgrid system security
security
security features
security problems
security solutions
smart grid communication network
Resiliency
smart grid system
Smart Grids
smart power grids
SmartGrid
software defined networking
Software Defined Networks
Switches
vulnerabilities
internet
Communication networks
computer centres
Computer crime
computer network security
critical infrastructure systems
Cyber Attacks
data center networks
DDoS
attack scenarios
Metrics
network topology
networking paradigm
Phasor measurement units
power engineering computing
power system security
pubcrawl
resilience
biblio
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
optimization
two-stage stochastic programming approach
Topology
Target Reconnaissance Attacks
stochastic programming
social networks analysis
social networking (online)
Social network services
social graph
Resiliency
Reconnaissance
pubcrawl
privacy
optimization problem
Adaptive Approximation Algorithms
online social networks
network topology
Network reconnaissance
near-optimal parallel batching
Max-Crawling
graph theory
data privacy
approximation ratio
Algorithm design and analysis
Adaptive Stochastic Optimization
adaptive reconnaissance attacks
adaptive monotonic submodular properties
biblio
Effects of Topology Information on Routing in Contention-Based Underwater Acoustic Networks
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
Relays
Underwater acoustics
underwater acoustic networks
underwater acoustic communication
topology information
Topology
terrestrial wireless network topology information
telecommunication network topology
telecommunication network routing
telecommunication network reliability
routing efficiency
Routing
robust information distribution
retransmission reduction
Resiliency
Reliability
acoustic communication
pubcrawl
Protocols
propagation delays
opportunistic flooding approach
network topology
network simulations
Network reconnaissance
network protocols
mine countermeasures
local topology information
Load modeling
energy consumption
degree-of-topology information
contention-based channel access method
Ad-Hoc Network
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »