Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireless communication
biblio
WIP: An Onion-Based Routing Protocol Strengthening Anonymity
Submitted by grigby1 on Wed, 02/09/2022 - 2:46pm
Onion
Analytical models
anonymity
Anonymous Communication Networks
composability
Global Adversary Model
Human behavior
Metrics
Multimedia communication
Wireless communication
overlay networks
privacy
pubcrawl
resilience
Resiliency
Routing
Routing protocols
timing
biblio
Impact of Bushfire Dynamics on the Performance of MANETs
Submitted by grigby1 on Tue, 02/08/2022 - 11:48am
Handover
MANET security
Bushfire Communications
Unmanned Aerial Vehicles
QoI
Degradation
MANETs
simulation
Compositionality
Forestry
Ad hoc networks
composability
Wireless communication
Resiliency
resilience
Metrics
pubcrawl
biblio
Secure Routing Protocols for MANET-enabled IoT
Submitted by grigby1 on Tue, 02/08/2022 - 11:47am
Wireless communication
MANET security
MANET
AODV
Routing protocols
Compositionality
sensors
Routing
composability
Internet of Things
wireless sensor networks
Cryptography
Resiliency
resilience
Metrics
pubcrawl
IoT
security
biblio
Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator
Submitted by grigby1 on Tue, 02/08/2022 - 11:40am
composability
Wormhole
QualNet Simulator
Mobile Ad Hoc
Systems engineering and theory
manet privacy
mobile nodes
Network
Compositionality
pubcrawl
Wireless communication
Computational modeling
privacy
Data models
Conferences
Resiliency
resilience
Metrics
biblio
A Survey on Intrusion Detection System in Ad Hoc Networks Based on Machine Learning
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Industries
MANET Attack Detection
Traffic
Network
intrusion
detection
ANN
telecommunication traffic
WSN
MANET
Compositionality
Logic gates
Resiliency
Metrics
pubcrawl
Wireless communication
SDN
machine learning
Intrusion Detection
wireless sensor networks
Monitoring
biblio
Machine Learning and Data Mining in Cybersecurty
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
machine learning
MANET Attack Detection
Intrusion Detection Systems
Cybersecurty Machine learning
ad hoc network
Data mining
Classification algorithms
MANET
Compositionality
Support vector machines
Resiliency
Metrics
pubcrawl
Wireless communication
machine learning algorithms
Training
Intrusion Detection
biblio
Detection Jellyfish Attacks Against Dymo Routing Protocol on Manet Using Delay Per-Hop Indicator (Delphi) Method
Submitted by aekwall on Mon, 02/07/2022 - 5:08pm
delays
Routing
information technology
Wireless communication
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
mobile computing
Routing protocols
DELPHI
DYMO
Jellyfish
MANET Attack Detection
biblio
Modeling Intrusion Detection System Using Machine Learning Algorithms in Wireless Sensor Networks
Submitted by grigby1 on Mon, 02/07/2022 - 4:46pm
sensor security
composability
hybrid system
intrusion detection system
machine learning
machine learning algorithms
privacy
pubcrawl
resilience
Resiliency
Temperature distribution
Temperature measurement
Temperature sensors
Vibrations
Wireless communication
wireless sensor networks
biblio
TrustZone Based Virtual Architecture of Power Intelligent Terminal
Submitted by grigby1 on Mon, 02/07/2022 - 4:45pm
real-time systems
Microelectronics Security
virtual architecture
power IoT terminal
Embedded System
Microelectronics
TrustZone
Systems architecture
Virtualization
computer architecture
composability
Wireless communication
Resiliency
resilience
Metrics
pubcrawl
security
Internet of Things
biblio
Cooperative Machine Learning Techniques for Cloud Intrusion Detection
Submitted by grigby1 on Mon, 02/07/2022 - 4:45pm
resilience
secure packet classifier
firewalls
composability
Wireless communication
machine learning techniques
Computational modeling
Cloud Security
Resiliency
privacy
pubcrawl
Intrusion Detection Systems
security
machine learning algorithms
machine learning
Cloud Computing
Training
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »