Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity
biblio
An energy-efficient routing technique for privacy preservation of assets monitored with WSN
Submitted by BrandonB on Mon, 05/04/2015 - 1:46pm
phantom source
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication power management
Routing protocols
Routing
privacy preservation
privacy
Phantoms
asset monitoring
phantom node
Monitoring
fake packet injection technique
energy efficient routing technique
energy conservation
endangered species monitoring
delays
data privacy
Base stations
base station
biblio
Analyzing active probing for practical intrusion detection in Wireless Multihop Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:49am
active-probing-based network intrusion detection system
Ad hoc networks
Communication system security
frequency hop communication
Intrusion Detection
Routing protocols
security of data
testing
Wireless communication
wireless mesh network
wireless mesh networks
wireless multihop networks
wireless sensor networks
biblio
Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast Protocols
Submitted by BrandonB on Fri, 05/01/2015 - 9:49am
optimization
WMN
wireless mesh networks
wireless links
Wireless communication
simple graph models
search problems
Routing protocols
Protocols
Probabilistic logic
probabilistic edge weights
probabilistic breadth-first search
path lengths
Approximation methods
NWB protocols
NWB optimizations
NWB dissemination
network-wide broadcasts
network-wide broadcast protocols
Monte Carlo methods
Monte Carlo method
Mathematical model
link qualities
graph theory
Complexity theory
complex propagation characteristics
biblio
A denial of service attack in advanced metering infrastructure network
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
puppet attack
wireless mesh networks
smart power grids
smart power grid
smart meters
smart meter
security of data
Routing protocols
radiotelemetry
advanced metering infrastructure network
power system measurement
power engineering computing
MESH network
Floods
electricity
DoS attack
denial of service attack
Computer crime
biblio
Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:42am
radio aware optimized link state routing
WMN
wireless mesh networks
topology control
telecommunication network topology
telecommunication control
security mechanisms
security
Routing protocols
Routing Protocol
Routing
Cryptography
network simulator-3 simulations
IEEE 802.11 Standards
identity based encryption
IBE-RAOLSR protocols
IBE
hello messages
elliptic curve digital signature algorithm
ECDSA-RAOLSR protocols
digital signatures
delays
biblio
Bandwidth Distributed Denial of Service: Attacks and Defenses
Submitted by BrandonB on Thu, 04/30/2015 - 1:18pm
denial of service
Servers
Routing protocols
network congestion
legitimate traffic
IP networks
internet
DoS mitigation
DoS attacks
DoS
Bandwidth
DDoS
computer security
computer network security
Computer crime
BW-DDoS defense
BW-DDoS attacks
brute force mechanisms
bandwidth flooding
bandwidth distributed denial-of-service
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
next ›
last »