Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Blackhole Attack Cooperative Prevention Method in MANETs
Submitted by aekwall on Mon, 08/02/2021 - 3:13pm
manet attack prevention
Ad hoc networks
AODV
Blackhole
Compositionality
Conferences
MANET
MANET security
Metrics
mobile computing
Proposals
pubcrawl
Resiliency
Routing
Routing protocols
security
biblio
Wormhole Formation and Simulation in Dynamic Source Routing Protocol using NS3
Submitted by aekwall on Mon, 08/02/2021 - 3:12pm
security
simulation
Packet loss
Routing
mobile ad hoc networks
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
Routing protocols
Dsr
NS3 simulation
wormhole attack
MANET security
biblio
Mutation Testing to Validate Networks Protocols
Submitted by grigby1 on Wed, 07/28/2021 - 8:47am
ad-hoc networks
Communication system security
Complexity theory
Computing Theory
Metrics
Mutation testing
pubcrawl
Routing
Routing protocols
Security Metrics
Test case quality
testing
Time factors
wireless networks
wireless sensor networks
biblio
A Blockchain Model for Secure Communications in Internet of Vehicles
Submitted by grigby1 on Wed, 06/30/2021 - 3:57pm
pubcrawl
vehicular ad hoc networks
software-defined networking
security
secure communications
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
blockchain
Metrics
Internet of Vehicles
Internet of Things
Human Factors
Human behavior
High Performance Blockchain Consensus
cyber physical systems
Computational modeling
biblio
Cross-Layer Profiling of Encrypted Network Data for Anomaly Detection
Submitted by grigby1 on Tue, 05/25/2021 - 2:21pm
Cross Layer Security
Anomaly Detection
composability
deep learning
encrypted communications
encryption
feature extraction
IP networks
machine learning.
network data analysis
Protocols
pubcrawl
resilience
Resiliency
Routing protocols
biblio
A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT
Submitted by grigby1 on Fri, 04/09/2021 - 11:36am
RPL Routing
Peer-to-peer computing
pubcrawl
resilience
Resiliency
Routing
routing loops
Routing Protocol
Routing protocols
RPL performance
network reliability
RPL routing security scheme
security
sensor devices
sensor nodes
telecommunication network topology
wireless link
wireless sensor networks
WSN
IDS
Blackhole attack
composability
computer network security
count data
data packets
destination data delivery
exchange data routing
expected IDS
Black hole attackers
Internet of Things
IoT
IP networks
L-IDs
L-IDS procedure
LHV value
Link Hop Value-based Intrusion Detection System
network performance
biblio
Reducing Processing Delay and Node Load Using Push-Based Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:31pm
information-centric networking
specific content
returns data
push-type communication method
push-based information-centric networking
pull-type communication method
packet processing delay time
node load
contents deliver
content distribution method
faces
edge node
Information Centric Networks
named data networking
Scalability
ICN
delays
Load modeling
Routing protocols
network traffic
telecommunication network routing
Distributed databases
internet
Routing
pubcrawl
Resiliency
telecommunication traffic
Servers
biblio
Analysis of Content Availability at Network Failure in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:28pm
computer network reliability
random node removal
nodes reachability
node removal
network robustness
network failure
information-centric net-working (ICN)
host-centric networks
contents server
content availability
cluster-based node removal
caching contents
average content availability
cache storage
Scalability
Information Centric Networks
information-centric networking
telecommunication network topology
Measurement
Routing protocols
network topology
Mathematical model
Analytical models
internet
Robustness
pubcrawl
Resiliency
biblio
An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:04pm
secured communication
Cognitive Radio Security
weighted graph problem
V2V communications
stable transmission path
stable paths
spectrum awareness
shared common channels
secured paths
mobility pattern
efficient routing performance
efficient reactive routing protocol
dynamic behavior
cognitive radio sensor networks
channel availability
Ad hoc networks
telecommunication security
cognitive radio
source node
Routing Protocol
spectrum availability
WSN
Switches
delays
Reliability
Routing
graph theory
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
biblio
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
Routing protocols
network operation
peer connections
Peer-to-peer computing
peering decision
peering dynamics
prefix hijacking attack
propagation delays
pubcrawl
public Bitcoin
Reliability
network adversary
routing-level attacks
security
sophisticated attack strategies
stealthier partitioning attack
targeted Bitcoin node
telecommunication network routing
telecommunication network topology
telecommunication traffic
time 5.0 week to 6.0 week
Bitcoin network
Scalability
Resiliency
Metrics
Human Factors
abundant network address resources
ASes
attack execution period
attack traffic rate
bitcoin
Bitcoin core
peer to peer security
Bitcoin peer-to-peer network
centralization problem
computer network security
eclipse attack
EREBUS attack
Human behavior
IP networks
Monitoring
natural man-in-the-middle network
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »