Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad hoc networks
biblio
Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM)
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
MANET
MANET Attack Detection
HCIDM
Cluster Routing
CCIDM
trust
wireless networks
mobile computing
Ad hoc networks
collaboration
Compositionality
Resiliency
Metrics
pubcrawl
Routing
Intrusion Detection
Clustering algorithms
biblio
Talking After Lights Out: An Ad Hoc Network for Electric Grid Recovery
Submitted by aekwall on Mon, 01/31/2022 - 4:15pm
network security
Wireless communication
pubcrawl
Metrics
Resiliency
composability
Ad hoc networks
Prototypes
SCADA systems
Substations
process control
Mesh networks
wireless mesh networks
network architecture
Software Architecture
biblio
On the Connectivity and Giant Component Size of Random K-out Graphs Under Randomly Deleted Nodes
Submitted by grigby1 on Tue, 12/21/2021 - 10:19am
random K-out graphs
wireless sensor networks
Upper bound
security
Scalability
Routing
Robustness
Resiliency
resilience
Ad hoc networks
random graphs
pubcrawl
privacy
giant component
Cryptography
connectivity
Computer simulation
anonymous messaging
biblio
Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol
Submitted by aekwall on Mon, 12/20/2021 - 12:20pm
mobile ad hoc networks
vehicular networks
V2V communications
Routing protocols
Routing
Resiliency
Reliability
pubcrawl
performance evaluation
Ad Hoc Network Security
Metrics
Conferences
computer network reliability
Compositionality
communication protocols
cognitive radio ad-hoc networks
Ad hoc networks
biblio
Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 12:20pm
Ad Hoc Network Security
Ad hoc networks
authentication protocol
Compositionality
Intelligent Transportation Systems
Internet of Things
Metrics
protocol
Protocols
pubcrawl
resilience
Resiliency
security
security protocol
sensors
biblio
Security architecture for UAV
Submitted by aekwall on Mon, 12/20/2021 - 12:19pm
Neural networks
wireless
Wi-Fi
vulnerabilities
threats
statistical analysis
security
Resiliency
pubcrawl
Ad Hoc Network Security
Metrics
Law
cyber-physical systems
computer architecture
Compositionality
attacks
ad-hoc systems
Ad hoc networks
biblio
A Multidimensional Trust Model for Vehicular Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 12:18pm
Ad Hoc Network Security
Ad hoc networks
Compositionality
Computational modeling
Conferences
fault tolerance
Fault tolerant systems
malicious nodes
Metrics
pubcrawl
Resiliency
security
trust
VANET
Vehicular Ad-hoc Network
Wireless communication
biblio
Elliptic Curve Parameters Optimization for Lightweight Cryptography in Mobile-Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 12:18pm
Ad Hoc Network Security
Ad hoc networks
Compositionality
delays
elliptic curve
Elliptic curve cryptography
lightweight cryptography
Memory management
Metrics
Mobile Ad-Hoc Networks (MANETs)
Power demand
pubcrawl
Resiliency
Routing
Routing protocols
biblio
Securing Drone-based Ad Hoc Network Using Blockchain
Submitted by aekwall on Mon, 12/20/2021 - 12:18pm
Drone-based Ad Hoc Network
surveillance
security
Resiliency
pubcrawl
privacy
power plant
power generation
Metrics
drones
Acoustic Information
Compositionality
Blockchain Model
blockchain
Artificial Intelligence
Anomaly Detection
Ad hoc networks
Ad Hoc Network Security
Acoustics
biblio
Detection and Prevention of Blackhole Node
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
mobile computing
Topology
Throughput
Routing protocols
Routing
Resiliency
resilience
R-AODV
pubcrawl
Packet drop ratio (PDR)
NS-2.35
manet attack prevention
Metrics
MANET Attack Detection
end-to-end delay
encryption
Elliptic curve cryptography
ECC
Compositionality
Blackhole attack
Ad hoc networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »