Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
IPv6 Routing Protocol for Low-Power and Lossy Networks Implementation in Network Simulator \#x2014; 3
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Policy
wireless sensor networks
Topology
telecommunication power management
RPL multiple instances
RPL
Routing protocols
Routing
reliable communication
pubcrawl
protocol verification
privacy
policy-based collaboration
Compositionality
physical environments
NS3
ns-3 implementation
network simulator
maintenance engineering
lossy networks implementation
lossy environments
Linear programming
IPv6 Routing Protocol
IP networks
Hardware
efficient energy management system
biblio
Network economics of SDN-based infrastructures: Can we unlock value through ICN multicast?
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
network economics
Web and internet services
Unicast
software defined networking
SDN security
SDN infrastructure
Scalability
Routing protocols
routing infrastructures
Resiliency
pubcrawl
Protocols
performance evaluation
operator networks
Bandwidth
native IP multicast
multicast protocols
migration costs
lightweight multicast service delivery
IP-over-ICN deployments
IP networks
IP multicast delivery
Internet Protocol services
internet
information-centric networking principles
ICN multicast
Economics
computer network security
biblio
TARN: A SDN-based traffic analysis resistant network architecture
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
Scalability
network communications
Open vSwitches
PEERING BGP testbed
Peer-to-peer computing
pseudorandom IP addresses
pubcrawl
Resiliency
Routing
Routing protocols
large-scale traffic analysis resistant network support
SDN
SDN security
SDX solution
Software
software defined networking
TARN
telecommunication traffic
traffic analysis resistant network architecture
YouTube
Hidden Markov models
computer network security
customer-driven network services
customizable trustable end-to-end network services
destination IP prefix
destination networks
distributed software defined Internet exchange
DNS/IP filtering
end-to-end communication session
end-to-end network services
business model
intended destination AS's prefix
internet
Internet autonomous systems
Internet routing
IP addressing freedom
IP networks
IP prefixes
IPv4
IPv6
biblio
Sybil attack in IOT: Modelling and defenses
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
legitimate nodes
trust value
Throughput
sybil nodes
sybil attacks
security
Routing protocols
Routing
Resiliency
pubcrawl
Peer-to-peer computing
neighbouring nodes
Metrics
ad hoc on-demand distance vector
IoT network
Internet of Things
information technology
enhanced AODV protocol
EAODV protocol
EAODV
delays
defense mechanism
computer network security
composability
behavioural profiling
AODV
biblio
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
quality-of-service constraints
Yices SMT Solver
Trust Routing
SMT-LIB language
SMT-LIB
security
secure routing protocol
Scalability
Routing protocols
Routing Protocol
routing functions
Routing
Resiliency
resilience
requirement models
requirement constraints
Adaptation models
quality of service
QoS constraints
pubcrawl
network topology
mobile nodes
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
MANET
formal verification
formal modelling
composability
adaptive routing protocol
biblio
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
RPL protocol
pubcrawl
resilience
Resiliency
Routing
routing protocol for low-power and lossy networks
Routing protocols
routing security
RPL
power aware computing
Scalability
stolen identities
Sybil attack
SybM
Topology
Trust Routing
trust-based intrusion detection system
IoT security
computer network performance evaluation
computer network security
control overhead
energy consumption
fake control messages
Internet of Things
Internet of Things applications
IoT
composability
mobile computing
mobile nodes
mobile sybil attacks
network topology
packet delivery
performance evaluation
physical adversary
biblio
New Trust Metric for the RPL Routing Protocol
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
security
resilience
Resiliency
Routing
routing nodes
Routing protocols
RPL
RPL routing protocol
Scalability
Secure Routing
reliable routing processes
Selfish nodes
telecommunication network reliability
telecommunication security
trust inference problem
Trust management
trust metric
trust objective function
Trust Routing
vital security requirement
Linear programming
BR
collaboration
composability
distributed Bellman-Ford algorithm
DODAG information object message
ERNT
extended RPL node trustworthiness
Internet of Things
IoT security
border router
lossy networks
Low power
maintenance engineering
Measurement
metric based RPL trustworthiness scheme
MRTS
new Objective Function TOF
pubcrawl
biblio
Link Reliable and Trust Aware RPL Routing Protocol for Internet of Things
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
Scalability
QoS
QoS guarantees
quality of service
resilience
Resiliency
Routing
Routing protocols
RPL
pubcrawl
security
standardized protocols
telecommunication security
Topology
trust model
Trust Routing
trust value computation
composability
processing resources
power consumption
network routing topology
multidimensional approach
memory usage
low-power lossy networks
link reliable-trust aware RPL routing protocol
IoT environment
IoT entities
IoT
Internet of Things
heterogeneous devices
Energy Efficiency
deployed devices
Computational modeling
biblio
CENTRA: CENtrally Trusted Routing vAlidation for IGP
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
routing policies
PKI
practical Internet
pubcrawl
public key cryptography
public key infrastructure
real-time systems
resilience
Resiliency
Routing
routing monitoring systems
OSPF
Routing protocols
Scalability
SDN
secure routing mechanism
secure routing policy
Software Defined Network
software defined networking
Trust Routing
trusted routing
YANG
IGP
anomalous routing detection
Anomaly Detection
authentication
CENTRA
Centrally Controlling
CENtrally Trusted Routing vAlidation framework
communication protocol
composability
computer network security
Data Model
anomalous routing blockage
interior gateway protocols
internet
Internet service providers
internetworking
ISP
knowledge base-this
Monitoring
Neighbor
NETCONF
network security
biblio
Trust-Based Protocol for Securing Routing in Opportunistic Networks
Submitted by grigby1 on Wed, 04/11/2018 - 3:02pm
pubcrawl
trust-based routing protocol
Trust Routing
telecommunication security
telecommunication network topology
store-carry-forward mechanism
securing routing
Scalability
Routing protocols
Routing
Resiliency
resilience
Ad hoc networks
Packet loss
Opportunistic Networks
Mathematical model
malicious nodes
gray-hole attack
end-to-end connection
dynamic network topology
delivery success ratio
composability
black-hole attack
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »