Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Advanced interest flooding attacks in named-data networking
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
resilience
Monitoring
multicast communication
multicast communications
Named-Data Networking
network infrastructure
policy governance
Policy-Governed Secure Collaboration
pubcrawl
Metrics
Resiliency
Robustness
Routing protocols
security of data
specific DDoS attack
telecommunication security
unsatisfiable content requests
data-plane
advanced interest flooding attacks
clean slate
clean-slate Internet proposal
collaboration
complete attack model
computer architecture
Computer crime
computer network security
advanced IFA
Electronic mail
Human behavior
human factor
Human Factors
information-centric networking
Interest Flooding Attack
internet
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
biblio
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Submitted by grigby1 on Thu, 02/15/2018 - 11:41am
Peer-to-peer computing
Human behavior
human factor
Human Factors
internet
Internet routing infrastructure
IP networks
mining pools
P2P networks
electronic money
pubcrawl
Routing
routing advertisements
routing attacks
routing manipulation
Routing protocols
Scalability
telecommunication network routing
bitcoin security
authorisation
autonomous systems
BGP
BGP hijack
BGP hijacks
BGP routing data
bitcoin
Bitcoin hijacking
ASes
Bitcoin topology
Bitcoin traffic manipulation
Computer crime
cryptocurrencies
cryptocurrency
Cryptography
Data mining
delays
biblio
The Design and Implementation of a Multicast Address Moving Target Defensive System for Internet-of-Things Applications
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
multicast communication
working IoT operating system
Synchronization
Simple Agile RPL multiCAST
SARCAST
Routing protocols
Resistance
Resiliency
Reconnaissance
pubcrawl
Protocols
operating systems (computers)
Network reconnaissance
network performance
address agility
multicast address moving target defensive system
IP networks
Internet-of-Things routing protocol
Internet-of-Things applications
Internet of Things
DRM
distributed denial-of-service attacks
DDoS Resistant Multicast
DDoS protection
DDoS Attacks
computer network security
Computer crime
computer architecture
biblio
Black hole attack prevention method using dynamic threshold in mobile ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
mobile ad hoc network
telecommunication security
security issues
security attack
Routing protocols
routing information exchange
Routing
Resiliency
pubcrawl
network infrastructure
mobile nodes
mobile ad hoc networks
Ad Hoc Network Security
MANET
malicious node
IP networks
Human Factors
Human behavior
fake routing information
dynamic threshold
data packets
composability
black hole node detection rate
black hole attack prevention method
biblio
Enhancing security for load balanced energy enhanced clustered bee ad hoc network using secret public keys
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
pubcrawl
wireless network
telecommunication security
Security Public Key Cryptography
security
secured PKI scheme
secret public keys
Routing protocols
Routing
resource allocation
Resiliency
public key cryptography
Ad Hoc Network Security
path selection
mobile ad hoc networks
mobile ad hoc network
MANET
load balanced energy enhanced clustered bee ad hoc network
LBEE
Human Factors
Human behavior
Energy Efficiency
composability
biblio
Secure routing against DDoS attack in wireless sensor network
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
pubcrawl
WSNs
wireless sensor networks
Wireless Sensor Network
UDP messages
TCP messages
sink node
sensor placement
sensor nodes
security scheme
security Algorithm
secure routing protocol
Routing protocols
Routing
Resiliency
composability
Monitoring
Metrics
message passing
IPS node
IPS
IP networks
intrusion prevention scheme
intrusion
Human behavior
DDoS Attack Prevention
DDoS Attack
computer network security
Computer crime
biblio
New LQR Protocols with Intrusion Detection Schemes for IOT Security
Submitted by grigby1 on Tue, 12/12/2017 - 1:29pm
Monitoring
wireless sensor networks
Wireless Sensor Network
Wireless communication
Routing protocols
Routing
Resiliency
pubcrawl
network intrusion detection
Base stations
Metrics
Link Quality Routing
IoT security
Internet of Things
Human Factors
Human behavior
estimation
composability
biblio
Determining proximal geolocation of IoT edge devices via covert channel
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
IoT edge devices
trusted router
tools
telecommunication channels
smart meters
Scalability
Routing protocols
roadside speed sensors
Resiliency
radiation sensors
pubcrawl
Protocols
pressure sensors
IP packets
IP networks
chemical sensors
Internet Protocol
Internet packet router authentication
Internet of Things
internet
Intelligent sensors
Geology
geolocation techniques
geolocation authentication
geolocation
covert channels
covert channel
computer network security
Compositionality
command and control center
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
next ›
last »