Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Performance analysis
biblio
Performance Analysis of Between Software Defined Wireless Network and Mobile Ad Hoc Network Under DoS Attack
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
SDN structure
network security
Performance analysis
performance criteria
performance values
Resiliency
Routing protocols
SDN
SDN controller
network performance
SDN technology
Software Defined Network
software defined networking
Software Defined wireless Network
traditional network structure
traditional network used today
wireless network technologies
pubcrawl
network interruption
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET structure
MANET routing protocols
MANET
DoS attack
DoS
controller
computer network security
Compositionality
communication technologies
Bandwidth
Ad Hoc Network Security
biblio
Collaborative KP-ABE for cloud-based Internet of Things applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
Internet of Things
Trusted Computing
trusted assistant nodes
storage management
storage capacities
Servers
sensors
security scheme
Scalability
resource-limited networks
pubcrawl
policy-based governance
Performance analysis
KP-ABE
key-policy attribute-based encryption
key policy attribute based encryption
Access Control
encryption
Cryptography
cryptographic scheme
computer network security
collaborative KP-ABE
collaboration
cloud-based IoT applications
cloud-based Internet of Things applications
cloud servers
cloud resources
Cloud Computing
C-KP-ABE
authorisation
Asymmetric Encryption
access control solutions
biblio
Multi-Tier and Multi-Band Heterogeneous Wireless Networks with Black Hole Attacks
Submitted by grigby1 on Thu, 06/04/2020 - 11:48am
Communication system security
composability
cyber physical systems
Employment
Human Factors
immersive systems
Performance analysis
privacy
pubcrawl
resilience
Resiliency
sensors
wireless networks
wireless sensor networks
biblio
Performance Analysis of OLSR Protocol under MPR Attack in Progressive Size Grid MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
1-hop neighbor nodes
topological information
progressive size grid MANET
proactive routing protocol
predefined infrastructures
OLSR protocol
OLSR
MPR attack
mobile ad hoc network
low level applications
hello messages
grid MANET
efficient OLSR attacks
effective routing protocol
control messages
central administration
security
Performance analysis
MANET security
battery life
relay networks (telecommunication)
Compositionality
mobile devices
telecommunication network topology
mobile ad-hoc network
mobile ad hoc networks
MANET
Metrics
Routing protocols
pubcrawl
Resiliency
biblio
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
mobile ad hoc network
wormhole tunnels
wormhole attack
trust
Throughput
telecommunication security
suggested trust based routing algorithm
spoofing attack
self-assembly
Routing protocols
routing algorithm
Routing
Resiliency
pubcrawl
Performance analysis
mobile ad hoc networks
Attack vectors
Metrics
MANET security
MANET
Jitter
dynamic source routing
DSR routing protocols
Dsr
delays
Compositionality
common routing protocols
Black hole attack
AODV routing protocols
AODV
Ad-hoc On-demand Distance Vector
biblio
A Flow-Level Architecture for Balancing Accountability and Privacy
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
privacy
self-certifying identifier
Performance analysis
network flows
multidelegate mechanism
Internet service provider
flow-level architecture
delegate-registry cooperation scheme
accountability
network accountability
internet
Metrics
computer network security
composability
pubcrawl
Resiliency
computer architecture
Trusted Computing
Protocols
security
Receivers
data privacy
IP networks
biblio
Performance Analysis of Floating Buoy Point Absorber and Oscillating Surge Wave Energy Converters in Onshore and Offshore Locations
Submitted by grigby1 on Fri, 04/24/2020 - 4:08pm
Resiliency
oscillating surge wave energy converters
Performance analysis
power generation
privacy
pubcrawl
renewable energy
Renewable Energy Resources
renewable energy sources
resilience
oscillating behaviors
Solid modeling
Surges
Variability
wave energy converter
wave period
wave power
wave power generation
wave power plants
WEC devices
Mathematical model
Bay of Bengal
clean energy targets
composability
Computational modeling
FBPA WEC
floating buoy point absorber
Force
greenhouse gas emission reduction
irregular wave conditions
Bangladesh
Metrics
ocean waves
offshore
offshore location
offshore wave height
onshore
onshore location
onshore wave height
OS WEC
biblio
Multi-work Condition Modeling and Performance Analysis of Linear Oscillating Actuators
Submitted by grigby1 on Fri, 04/24/2020 - 4:08pm
pubcrawl
Mathematical model
Metrics
multi-work condition
multiwork condition modeling
nonresonance frequencies
oscillating behaviors
Performance analysis
privacy
Load modeling
resilience
Resiliency
Resonant frequency
resonant principle
spring oscillator
springs (mechanical)
Windings
electrical motors
actuator health status
actuators
Coils
composability
constant impedance angle method
direct-drive electromechanical systems
electric actuators
electric motors
actuator behavior
electromechanical actuators
electromechanical model
finite element analysis
Force
linear motors
linear oscillating actuator
linear oscillating actuators
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »