Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Mobile Ad Hoc Network for Security Enhancement
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
MANET
telecommunication security
security enhancement
Secure Hashing Algorithm
Routing protocols
Resiliency
reactive method
Public key
proactive method
private key
mobile ad hoc networks
mobile ad hoc network
Metrics
Message Digest 5
pubcrawl
identification process
hackers node
game theory
game theoretical approach
encryption
decryption processes
Cryptography
Compositionality
AODV
advanced encryption standard
ad hoc on-demand distance vector routing protocol
Ad Hoc Network Security
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
quality of service
wormhole attack detection
UAV swarm
UAV ad hoc network
UAANET
telecommunication security
SUAP
security of data
security mechanisms
security architecture
Secure UAV Ad hoc routing Protocol
secure routing protocol
Routing protocols
Routing Protocol
Resiliency
Real-world experiment
pubcrawl
performance evaluation
network integrity
network architecture
multiple node attack
multi-robot systems
mobile ad hoc networks
mobile ad hoc network
Metrics
message authentication
ground control station
Compositionality
autonomous aerial vehicles
aircraft communication
Ad Hoc Network Security
biblio
A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural Network
Submitted by aekwall on Mon, 08/03/2020 - 10:17am
numerous security challenges
telecommunication security
telecommunication computing
software agents
service providers
service discovery process
service discovery operation
service discovery
security information
security
Routing protocols
quality of service
QoS
pubcrawl
manet privacy
neural nets
mobile ad hoc networks
mobile ad hoc network
MANET
improved security
cross-layer discovery
artificial deep neural network
agent-based cross-layer
agent based secure service discovery scheme
Ad Hoc Network Security
Compositionality
Metrics
Resiliency
biblio
Survey on Fault Tolerance and Security in Mobile Ad Hoc Networks (MANETs)
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
Ad hoc networks
unipath routing
unipath protocols
multipath protocols
MBID
IDS for Mobile Ad hoc Networks
cooperative security
ABID
intrusion tolerance
network topology
Fault tolerant systems
mobile computing
telecommunication security
telecommunication network topology
mobile ad hoc networks
MANET
fault tolerance
Routing protocols
multipath routing
Routing
Protocols
composability
pubcrawl
Resiliency
biblio
A cyber physical power system co-simulation platform
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
power engineering computing
Voltage control
Synchronization
smart power grids
simulations
simulation
Routing protocols
Resiliency
resilience
real-time systems
pubcrawl
power system stability
power system simulation
power system security
power system control
Power Grid
automatic voltage control
Metrics
information and communication technology
hardware-in-the-loop simulation function
Hardware-in-the-loop (HIL)
hardware-in-the loop simulation
denial-of-service attack
cyber-attack
Cyber Physical System (CPS)
Cyber Physical System
cyber physical power system co-simulation platform
CPS modeling
control engineering computing
composability
closed loop systems
AVC
biblio
Implementation of Lightweight Stream Cipher in AODV Routing Protocol for MANET
Submitted by grigby1 on Mon, 06/01/2020 - 3:59pm
AODV
Blackhole attack
computer science
encryption
HMAC
lightweight stream cipher
MANET
mobile ad hoc networks
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
Trivium
biblio
Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
Scalability
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attack detection techniques
RPL based loT
RPL based routing attacks
rank attack
security
security of data
source routing protocol
Topology
version attack
Wormhole
wormhole attack
Intrusion Detection
Blackhole
Blackhole attack
computer network security
Conferences
countermeasures
IDS
IDS research contribution techniques
Internet of Things
attacks
intrusion detection system
IoT
knowledge driven approach
lightweight routing protocol stack
LLN
low power lossy networks
pubcrawl
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
Comparitive Analysis of Blackhole and Rushing Attack in MANET
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
NS-2 network simulator
wireless networking technology
telecommunication security
Scalability
Rushing attack.
rushing attack
Routing protocols
Resiliency
resilience
pubcrawl
packet delivery ratio
AODV
network layer attack
mobile ad hoc networks
MANETs
MANET
end to end delay
data forwarding operations
centralized network administration
Blackhole attack
Black hole attack
AODV routing protocol
biblio
Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
Law
Wireless communication
version number attack
smart power grids
smart meters
Smart Grid
Scalability
RPL
Routing protocols
routing protocol for low-power and lossy networks
Routing
Resiliency
resilience
pubcrawl
power system security
advanced metering infrastructure
IETF ROLL working group
filtering theory
Cyber Attacks
cuckoo-RPL
cuckoo filter.
cuckoo filter based RPL
computer network security
computer network reliability
Blackhole attack
authorisation
authentication
AMI network
Advanced Metering Infrastructure (AMI)
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »