Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile communication
biblio
Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
mobile computing
wireless movable nodes
telecommunication security
Security Heuristics
Scalability
Resiliency
pubcrawl
particle swarm optimization
particle swarm optimisation
network simulator
multiple gray hole attack
mobile nodes
Cooperative Gray Hole attack
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
meta heuristic
MANET
malicious node
intermediate nodes
gray hole attack prevention
data packets
biblio
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
production engineering computing
Time factors
supply chain security
supply chain management
Servers
security of data
security issues
Secure-EPCIS
SCM
Scalability
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
Access Control
Product codes
Permission
Mobile communication
IoT
Internet of Things
Human behavior
EPCIS
EPCglobal standards
EPCglobal Network
electronic products
Electronic Product Code Information System
Data Security
access-control
biblio
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
quality-of-service constraints
Yices SMT Solver
Trust Routing
SMT-LIB language
SMT-LIB
security
secure routing protocol
Scalability
Routing protocols
Routing Protocol
routing functions
Routing
Resiliency
resilience
requirement models
requirement constraints
Adaptation models
quality of service
QoS constraints
pubcrawl
network topology
mobile nodes
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
MANET
formal verification
formal modelling
composability
adaptive routing protocol
biblio
Real-time localization of mobile targets using abnormal wireless signals
Submitted by K_Hooper on Wed, 04/04/2018 - 9:52am
pubcrawl
wireless sensor networks
Wireless communication
Underwater Networks
target tracking
signal processing
Scalability
Resiliency
real-time systems
real-time localization
abnormal wireless signals
multiwireless signals
mobile targets
Mobile communication
Metrics
Mathematical model
GPS signals
Global Positioning System
Communication system security
biblio
A New Mobile Botnet Classification Based on Permission and API Calls
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
pubcrawl
malware
mobile botnet attacks
mobile botnet classification
mobile botnet detection
Mobile communication
mobile computing
pattern classification
program diagnostics
malicious mobile applications
random forest algorithm
random processes
resilience
Resiliency
smart phones
smartphone
static analysis
Android (operating system)
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Humanoid robots
Feature Selection
feature extraction
Drebin dataset
Compositionality
application programming interface
application program interfaces
APIs
API calls
Androids
Android botnet
biblio
Boosting Anonymity in Wireless Sensor Networks
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
resilience
wireless sensor networks
Wireless Sensor Network
traffic pattern
telecommunication security
telecommunication network topology
sensor nodes
security
Routing
ring nodes
Resiliency
anonymity
pubcrawl
privacy
Monitoring
Mobile communication
mobile BS
Metrics
Mathematical model
Human behavior
composability
base station
biblio
A Trust-Based Intrusion Detection System for Mobile RPL Based Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
resilience
wireless sensor networks
Trusted Platform Module co-processor
Trust Routing
telecommunication security
T-IDS
Sybil-Mobile attack
Sybil attack
security attacks
RPL security
routing security
Routing protocols
Routing Protocol
Routing
Resiliency
6LoWPAN
pubcrawl
Peer-to-peer computing
off-load security related computation
Monitoring
mobility support
mobile RPL based networks
mobile radio
Mobile communication
IoT
Intrusion Detection System scheme
intrusion detection system
Intrusion Detection
Cyber Physical Systems Security
composability
biblio
Secure Protocol for Subscriber Identity Module
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
SIM
Protocols
pubcrawl
Ransomware
resilience
Resiliency
secure protocol
service provider
short messaging service
Poles and towers
social engineering
stolen SIM
subscriber Identity Module
user contacts
user credentials
user sensitive information
VLR
HLR
authorisation
banking information
Carrier
composability
current SIM model
data privacy
ECC
Elliptic curve cryptography
authentication
IMSI
internet
message authentication
Metrics
Mobile communication
Mobile handsets
modern mobile communication
biblio
A comparison of migration and multihoming support in IPv6 and XIA
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
quality of service
Mobility
mobility anchor point
mobility management (mobile radio)
multihomed hosts
multihoming
optimization
protocol messages
Protocols
pubcrawl
mobile radio
Resiliency
resource allocation
Routing
Routing protocols
telecommunication network routing
telecommunication security
wireless LAN
XIA
XIA Migration Protocol
IP networks
client mobility
collaboration
composability
computer network management
fault tolerance
flow migration support
flow-level migration
heavy-weight protocol
internet
allocative efficiency
IPv6 address
IPv6 multihoming solutions
ipv6 security
Metrics
Mobile communication
mobile computing
Mobile IPv6
Mobile IPv6 Enhanced Route Optimization
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »