Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad hoc networks
biblio
Wormhole attack detection in ad hoc network using machine learning technique
Submitted by aekwall on Mon, 08/03/2020 - 9:19am
machine learning algorithms
wormhole attack detection
wormhole attack
Training
telecommunication security
Task Analysis
stochastic gradient descent
security
Resiliency
Peer-to-peer computing
Naive Bayes
multiple wormhole tunnels
Metrics
machine learning technique
pubcrawl
machine learning
learning (artificial intelligence)
final task
Feature Selection
false alarm rate
detection rate
data generation
data collection operation
Compositionality
Ad hoc networks
Ad Hoc Network Security
ad hoc network environment
ad hoc network
biblio
Survey on Fault Tolerance and Security in Mobile Ad Hoc Networks (MANETs)
Submitted by aekwall on Mon, 07/27/2020 - 11:13am
Ad hoc networks
unipath routing
unipath protocols
multipath protocols
MBID
IDS for Mobile Ad hoc Networks
cooperative security
ABID
intrusion tolerance
network topology
Fault tolerant systems
mobile computing
telecommunication security
telecommunication network topology
mobile ad hoc networks
MANET
fault tolerance
Routing protocols
multipath routing
Routing
Protocols
composability
pubcrawl
Resiliency
biblio
Behaviour Analysis and Detection of Blackhole Attacker Node under Reactive Routing Protocol in MANETs
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Scalability
Resiliency
pubcrawl
Routing
Routing protocols
collaboration
Throughput
MANETs
Ad hoc networks
mobile computing
AODV
Blackhole attack
Blackhole
Energy
PDR
Routing Protocol
biblio
Simulation Based Study of Blackhole Attack Under AODV Protocol
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Ad hoc networks
unauthorized node
target node
open access
Mobile adhoc Network
MANET nodes
Blackhole
AODV
AODV protocol
Blackhole attack
NS-2
mobile computing
Scalability
Throughput
mobile ad hoc networks
MANET
delays
Handheld computers
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
Mobile ad hoc networks (MANETs)
ad hoc nature
AODV protocol
battery power
central authority
dynamic topologies
IEEE 802.11ac protocol
industrial fields
memory space
Blackhole attack
mobile ad-hoc networks
mobility model
multiple Blackhole attack
NS-3 simulator
NS-3.27 simulator
OLSRprotocol
physical protection
single Blackhole attack
network nodes
telecommunication security
network security
Resiliency
pubcrawl
Routing protocols
Routing
mobile radio
delays
Scalability
Relays
wireless LAN
MANET
mobile ad hoc networks
telecommunication network topology
Ad hoc networks
mobile computing
fixed infrastructure
biblio
Node Identification in Wireless Network Based on Convolutional Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:01pm
wireless network
Neural Network Security
stochastic gradient descent method
softmax model
principal component analysis
node identification
local feature extraction
convolutional neural networks
convolutional neural network
Ad-Hoc Network
gradient methods
wireless networks
computational complexity
Metrics
learning (artificial intelligence)
Ad hoc networks
deep learning
wireless sensor networks
Resiliency
resilience
policy-based governance
pubcrawl
convolutional neural nets
convolution
feature extraction
collaboration
Training
biblio
Re-envisioning digital architectures connecting CE hardware for security, reliability and low energy
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
personal area networks
data transfer
digital architectures
Local area networks
Low power
low-power components
multiple bridged peripheral links
network architecture
Network of Things
peripheral interfaces
data network architecture
private universal data platform
push-pull data network architecture
scalable switchable data platform
Software Constructed ad-hoc circuit network
ultra-low power data platform
universal peripheral communications links
USB 3.0
USB 3.0 data transfer cables
Ad hoc networks
Hardware
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
privacy
internet
data privacy
electronic data interchange
Network Security Architecture
CE hardware
Consumer Data
consumer electronic systems
Consumer electronics
data connectivity technologies
data exchange
biblio
When Analog Meets Digital: Source-Encoded Physical-Layer Network Coding
Submitted by aekwall on Mon, 04/06/2020 - 8:56am
Relays
wireless networks
TWRC PLNC
two-hop node coordination
Topology
Throughput
telecommunication traffic
spread spectrum communication
Source-Encoded PLNC scheme
Source-Encoded Physical-Layer Network Coding
source coding
SE-PLNC
Resiliency
Ad hoc networks
relay networks (telecommunication)
pubcrawl
Predictive Metrics
physical-level network coding
network topology
network coding
multipath relaying opportunities
multihop wireless networks
cyber physical systems
composability
channel coding
ad-hoc networks
biblio
Robust Channel Parameters for Crypto Key Generation in Underwater Acoustic Systems
Submitted by aekwall on Mon, 03/02/2020 - 11:35am
quantisation (signal)
Underwater Networks
underwater acoustic systems
Underwater acoustic communications
underwater acoustic communication
telecommunication security
signal processing
Scalability
robust channel parameters
Resiliency
Ad hoc networks
pubcrawl
Physical layer security (PLS)
physical layer security
Metrics
key management
Cryptography
crypto-key generation algorithm
channel impulse response
ad hoc underwater acoustic networks
biblio
Fault Tolerance and Security in Forwarding Packets Using Game Theory
Submitted by aekwall on Mon, 12/30/2019 - 11:25am
price of anarchy
wireless sensor networks
wireless networks
wireless mesh networks
Waste materials
telecommunication security
telecommunication network reliability
self organized wireless network
security
Scalability
Relays
radio networks
pubcrawl
Ad hoc networks
Predictive Metrics
Nash Equilibrium
Mesh networks
Human Factors
game theory
game theoretic security
forwarding packet security
forwarding packet fault tolerance
fault tolerance
cooperation strategy
cooperation stimulation
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »