Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad hoc networks
biblio
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks
Submitted by aekwall on Mon, 12/30/2019 - 11:25am
directional antennas
game theoretic security
wireless nodes
wireless ad hoc networks
Thin film transistors
Resilience to Selfishness
Promoting cooperation
packet dropping mitigation
GTAMR protocol
game-theoretic adaptive multipath routing protocol
ERTFT game theoretic strategy
Energy states
Scalability
Ad-hoc Wireless Networks Security
Predictive Metrics
Human Factors
Games
Ad hoc networks
Routing
Routing protocols
pubcrawl
game theory
security
telecommunication security
biblio
The Detection of the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Networks
Submitted by grigby1 on Thu, 12/05/2019 - 9:55am
pubcrawl
unlicensed cognitive devices
telecommunication security
spectrum sensing data falsification attack
spectrum scarcity challenges
spectrum observations
spectrum band
signal detection
sensors
Resiliency
resilience
q-out-of-m rule scheme
Ad hoc networks
performance evaluation
modified Z-test
Licenced users
fading channels
Decision Making
Copper
Cognitive Radios
cognitive radio technology
Cognitive Radio Security
cognitive radio ad hoc networks
cognitive radio
biblio
The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-Hoc Networks
Submitted by grigby1 on Thu, 12/05/2019 - 9:55am
pubcrawl
wireless network systems
underutilized spectrum
telecommunication security
spectrum congestion
spectrum bands
signal detection
sensors
security measure
security
Resiliency
resilience
radio spectrums
radio spectrum management
Radio spectrum
Ad hoc networks
network leading interference
legitimate cognitive radios
Interference
data communications
cooperative communication
Consensus algorithm
Cognitive Radio Security
cognitive radio ad-hoc networks
cognitive radio
Cascading style sheets
byzantine attack mitigation scheme
byzantine attack
attack-proof cooperative spectrum sensing
biblio
Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments
Submitted by grigby1 on Thu, 12/05/2019 - 9:52am
Resiliency
NDN
node mobility
performance tuning
Policy
Policy Based Governance
policy governance
practical adoption
Protocols
pubcrawl
resilience
Named Data Networking (NDN)
stable connections
tactical applications
tactical edge networks
tactical environments
tactical networks
transport protocols
unreliable capacity limited performance
wireless nature
wireless sensor networks
ICN
application-specific extensions
clean slate
clean slate networking approach
collaboration
communication scenario
Engines
Face
fairly stable infrastructure-based environments
Human behavior
Human Factors
Ad hoc networks
information centric networking
Information-Centric Networking (ICN)
internet
IP networks
Metrics
military communication
mobile computing
mobile military networks
named data networking
biblio
Performance Analysis of Channel Coding Techniques for Cooperative Adhoc Network
Submitted by aekwall on Mon, 11/25/2019 - 1:06pm
low-density parity-check coding
wireless networks
turbo coding
Resiliency
Relays
relay networks (telecommunication)
Rayleigh fading channels
Rayleigh channels
quadrature amplitude modulation
pubcrawl
parity check codes
noise power spectral density
network coding
Metrics
Ad hoc networks
error statistics
Decode and Forward
cooperative communication
cooperative ad hoc network
convolutional coding
Conferences
composability
channel coding techniques
channel coding
channel capacity
Bit error rate
AWGN channels
additive white Gaussian noise
biblio
Secure and Efficient Approach to Prevent Ad Hoc Network Attacks Using Intrusion Detection System
Submitted by grigby1 on Mon, 11/04/2019 - 11:39am
mobile computing
Wireless communication
Ubuntu OS
telecommunication network topology
self-organizing
self-maintenance
security of data
security
secure mechanism
Router Systems Security
Resiliency
resilience
pubcrawl
NS 2.35 software
Ad hoc network attacks
mobile ad hoc networks
Metrics
MAES
Linux
intrusion detection system
Intrusion Detection
hybrid system
Elliptic curve cryptography
ECC
dynamic topology features
Conferences
Ad hoc networks
biblio
Trust Based Certificate Revocation and Attacks in MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
Metrics
vector-based trust mechanism
telecommunication security
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile computing
mobile ad-hoc network security
mobile ad hoc networks
Ad hoc networks
MANET security
MANET
enhanced certificate revocation scheme
data packets
Conferences
Compositionality
clustering
Certificate Revocation
blackhole attacker
attacks
biblio
Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
mobile computing
wireless technology
telecommunication security
telecommunication network topology
security challenges
security
Routing protocols
Routing
router
Resiliency
resilience
pubcrawl
mobile nodes
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs Security
MANETs Attacks
MANET topology
MANET security
MANET protocol stack
Compositionality
blackhole attacks
base station
biblio
Distributed Trust-Based Multiple Attack Prevention for Secure MANETs
Submitted by aekwall on Mon, 06/10/2019 - 9:19am
Ad hoc networks
composability
cyber physical systems
Data models
distributed trust
Intrusion Detection
MANET
manet attack prevention
Metrics
mobile computing
Multiple Attacks
network security
Probes
Receivers
Resiliency
Steady-state
biblio
Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
Submitted by aekwall on Mon, 06/10/2019 - 9:17am
Resiliency
wireless sensor networks
user security
traffic morphing
traffic analysis attack mitigation
telecommunication traffic
telecommunication security
telecommunication network routing
splitting traffic
Smartphones
smartphone sales
smartphone apps
smart phones
security
Routing
Ad hoc networks
Relays
pubcrawl
probability
privacy
multipath routing scheme
mobile computing
mobile ad hoc networks
Metrics
MANET Attack Mitigation
identifying apps
flow routing optimization problem
edge network assistance
data privacy
composability
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »