Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad hoc networks
biblio
MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
emergency response networks
Compositionality
Network
emergency management
emergency services
building mobile device trust
building resiliency
communication utility patterns
crowd sensing
Buildings
MACH 2K
MACH-2K trust overlay network architecture
message confidentiality
Mobile handsets
private mobile devices
public service networks
vpn
manet privacy
pubcrawl
architecture
Cryptography
data privacy
Organizations
telecommunication security
History
computer architecture
Resiliency
security
overlay networks
Peer-to-peer computing
Metrics
trust
Ad hoc networks
MANET
mobile ad hoc networks
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
A Secure Identity-based Deniable Authentication Protocol for MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
mobile ad hoc networks
manet privacy
secure identity-based deniable authentication protocol
identity-based cryptosystem
identity-based cryptography
IBDA protocol
heavy computational communication overhead
Deniable authentication
Bilinear Pairing
adequate security
mobile nodes
Compositionality
mobile devices
elliptic curve
mobile ad hoc network
mobile computing
Cryptography
MANET
Elliptic curves
Elliptic curve cryptography
public key cryptography
mobile radio
Ad hoc networks
message authentication
authentication
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 12:09pm
MultiLayer Perceptron neural network
wireless sensor networks
vehicular ad hoc networks
Vehicle to Vehicle communication
VANET
V2V communication
telecommunication security
telecommunication computing
sensors
security attacks
Roads
Resiliency
resilience
pubcrawl
multilayer perceptrons
Accidents
Multilayer Perceptron
MLP
Metrics
IoV network
Intrusion Detection
Internet of vehicles network
Internet of Vehicles (IoV)
Internet of Vehicles
Human Factors
embedded systems
distributed processing
distributed intrusion detection system
Ad hoc networks
biblio
Cyber security standards and issues in V2X communications for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 12:08pm
standardisation bodies
pubcrawl
resilience
Resiliency
security issues
security of data
smart power grids
standardisation
standardisation approaches
mobile radio
standardisation organisations
telecommunication security
Telecommunication standards
V2X
Vehicles significant developments
vehicular communication security
Vehicular Communication Systems
Human Factors
ad-hoc type network
compromised vulnerabilities
connected vehicles
current V2X communications
cyber security
cyber security standards
design
DSRC
Ad hoc networks
international standards
internet
Internet of Vehicles
ITS
ITS environment
Metrics
mobile computing
biblio
Anonymous Routing Protocols in MANETs, a Security Comparative Analysis
Submitted by grigby1 on Thu, 10/29/2020 - 11:58am
mobile ad hoc networks
telecommunication security
special type
self organized fashion
security comparative analysis
Routing protocols
Routing
Resiliency
resilience
pubcrawl
private routing protocols
privacy
performance capabilities
mobile computing
Ad hoc networks
mobile ad hoc network
military environments ones
Metrics
MANETs
manet privacy
MANET
fixed infrastructure
Cryptography
Compositionality
communication secrecy
civil environments ones
anonymous routing protocols
anonymous routing
biblio
Prevention Techniques Employed in Wireless Ad-Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 11:32am
optimisation
wireless sensor networks
Wireless communication
Wireless Ad-Hoc Networks
vehicular ad hoc networks
VANET
telecommunication security
telecommunication network routing
Routing
Resiliency
resilience
pubcrawl
Ad hoc networks
Metrics
manet attack prevention
MANET
genetic algorithm
fabrication
Compositionality
Communication system security
Black hole attack
Artificial Bee Colony
Ad-hoc wireless networks
biblio
Anatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Technology management
MANET Attack Detection
security attack
portable hubs
performance measure techniques
Packet loss
network parameters
mobile hubs
mobile ad-hoc network
MANETSs
inactive attack
Dynamic attack
detection anatomization
decentralized validation
security
mobile computing
automation
mobile ad hoc networks
MANETs
Flooding Attacks
Compositionality
Routing protocols
Ad hoc networks
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
underwater acoustic communication
secure access
security
telecommunication security
terrestrial MANETs
threat identification
Trust Management Framework
trust model
uncertainty
Scalability
underwater acoustic MANETs
Underwater Acoustic Mobile Ad-hoc Network
underwater acoustic Mobile Ad-hoc NETworks
Underwater acoustics
underwater environment
Unified modeling language
Vulnerability Analysis
Identity management
Access Control
Ad hoc networks
cloud model
communication metrics
computer theory
cyber security
harsh underwater environments
Human Factors
802.11-based MANET
Measurement
mobile ad hoc networks
mobile computing
multiparameter metrics
pubcrawl
resilience
Resiliency
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »