Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
gaussian distribution
specific internal attacks
special protocol
RPL-based internet
RPL networks
resource-constrained nature
networking
Neighbor Attack
Low-Power
lossy networks
large-scale networks
human interaction
everyday life
DIS Attack
Communications
anomaly-based lightweight Intrusion Detection System
IoT
6LoWPAN
RPL protocol
internet
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
Resiliency
telecommunication security
Internet of Things
Monitoring
IDS
computer network security
RPL
biblio
Attribute Based Trust Evaluation for Secure RPL Protocol in IoT Environment
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
Resiliency
location based service authentication
Low-Power and Lossy Networks
Medical services
memory requirements
personal area networks
physical objects
Protocols
pubcrawl
Public key
location based service
Routing
Routing protocols
RPL
secure RPL Protocol
security
security attacks
smart health care system
Symmetric matrices
Data collection
6LoWPAN networks
ABTE
advanced automation technology
attribute based trust evaluation
authentication
composability
computer network reliability
computer network security
critical data transfer reliability
6LoWPAN
energy constraint networks
energy consumption
Internet of Things
IoT constrained environments
IPv6 Routing Protocol
LBS
lightweight LBS authentication
LL networks
biblio
TCP/IP and ICN Networking Technologies for the Internet of Things: A Comparative Study
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
caching
TCPIP
TCP/IP stack
TCP/IP
packet level security
naming
IP-based technologies
IoT requirements
IoT environments
interconnecting resource-constrained devices
information-centric networks
information-centric networking paradigm
ICN networking technologies
communication paradigms
computer network security
Low-Power and Lossy Networks
6LoWPAN
Routing protocols
internet
composability
pubcrawl
Resiliency
transport protocols
computer architecture
IoT applications
security
Internet of Things
IP networks
biblio
IPv6-Based Smart Grid Communication over 6LoWPAN
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
local electric transformer
CAS
customer agents
Electric Grid
electric utilities
energy data
energy usage
future demand growth
IEEE 2030.5
IEEE 802.15 Standard
IPv6-based smart grid communication system
Carleton University
Low-Power and Lossy Networks
MESH network
OpenLab IEEE 802.15.4 chips
Routing Protocol
self-healing mesh network
Smart City concept
transformer agent
Two-Way Communication
two-way communication system
utility
6LoWPAN
IoT
RPL
IP networks
Resiliency
pubcrawl
composability
Routing protocols
Routing
Reliability
smart power grids
security
Smart Grids
Smart Grid
Mesh networks
wireless LAN
Zigbee
communication technologies
Communication Network
personal area networks
IPv6
biblio
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
directional antennas
game theoretic security
wireless nodes
wireless ad hoc networks
Thin film transistors
Resilience to Selfishness
Promoting cooperation
packet dropping mitigation
GTAMR protocol
game-theoretic adaptive multipath routing protocol
ERTFT game theoretic strategy
Energy states
Scalability
Ad-hoc Wireless Networks Security
Predictive Metrics
Human Factors
Games
Ad hoc networks
Routing
Routing protocols
pubcrawl
game theory
security
telecommunication security
biblio
Secure Routing for MANET Connected Internet of Things Systems
Submitted by grigby1 on Mon, 09/09/2019 - 10:57am
Resiliency
trusted device
telecommunication security
standardized routing protocol for low-power and lossy networks
sensor network
security threats
security enhanced routing protocols
security
Secure Routing
RPL
Routing protocols
Routing
Compositionality
resilience
pubcrawl
network security
mobile ad hoc networks
Metrics
MANET-IoT connectivity
MANET-connected Internet-of-Things systems
MANET security
MANET
IoT
Internet of Things
biblio
Trust Based Certificate Revocation and Attacks in MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Metrics
vector-based trust mechanism
telecommunication security
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile computing
mobile ad-hoc network security
mobile ad hoc networks
Ad hoc networks
MANET security
MANET
enhanced certificate revocation scheme
data packets
Conferences
Compositionality
clustering
Certificate Revocation
blackhole attacker
attacks
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
biblio
Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
mobile computing
wireless technology
telecommunication security
telecommunication network topology
security challenges
security
Routing protocols
Routing
router
Resiliency
resilience
pubcrawl
mobile nodes
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs Security
MANETs Attacks
MANET topology
MANET security
MANET protocol stack
Compositionality
blackhole attacks
base station
biblio
Trust-Based Performance Evaluation of Routing Protocol Design with Security and QoS over MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
policy-based network administration
usability
trust-based performance evaluation
telecommunication security
Routing protocols
routing protocol design
Resiliency
resilience
quality of service (QoS)
quality of service
QoS
pubcrawl
psychology
Pragmatics
ART
Mobile handsets
mobile circumstantial network
mobile ad hoc networks
Metrics
MANET security
MANET
Loading
Learning management systems
key administration
IPsec
Internet Protocol Security (IPsec)
Cryptographic Protocols
Compositionality
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »