Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad hoc networks
biblio
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
random geometric graph
IoT technology
Management
Mathematical model
military communication
military computing
military operations
multiplex networks
Multiplexing
optimisation
paradigm shift
Poisson point process
pubcrawl
IoT networks
reconfigurable IoBT networks
reconfigurable multilayer network design
resilience
Resiliency
Scalability
secure IoBT networks
security of data
smart cities
Smart homes
Stochastic processes
Wireless communication
critical information dissemination
automated systems
Battlefield
battlefield resources
battlefield specific challenges
battlefields
changing mission requirements
combat efficiency
combat equipment
Communication networks
control
coordinated automated decisions
coordinated decision-making
Ad hoc networks
Cyber-physical attacks
Decision Making
Epidemics
Geometry
health care
heterogeneous network devices
Human Factors
information dissemination
Internet of battlefield things
Internet of Things
iobt
biblio
Hierarchical Trust-Based Black-Hole Detection in WSN-Based Smart Grid Monitoring
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
Power Grid
WSN-based smart grid monitoring
wireless sensor networks
weighted clustering
telecommunication security
smart power grids
Smart Grid Sensors
smart grid monitoring
Resiliency
resilience
pubcrawl
Ad hoc networks
packets dropped ratio
Human Factors
Human behavior
hierarchical trust-based black-hole detection
hierarchical trust evaluation
data aggregation
Compositionality
cluster head
black-hole attack
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
biblio
Gray hole attack detection in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MD6 security algorithm
Message Digest 5
Metrics
mobile ad hoc networks
mobile ad-hoc network
Mobile communication
mobile computing
networking system
MD5 algorithm
resilience
Resiliency
routing overhead
Routing protocols
self-stabilizing election algorithm
telecommunication network routing
telecommunication security
voting
dynamic cluster head selection
Ad-hoc on demand distance vector protocol
AES security algorithm
Attack detection
batteries
battery power
Clustering algorithms
Compositionality
data transmission rate
Ad hoc networks
dynamic nodes
Election Algorithm
gray hole attack detection
gray hole nodes
identical broadcast range
intrusion detection system
intrusion revealing system
MANET
biblio
Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
resilience
Organizations
packet drop
Peer-to-peer computing
Protocols
pubcrawl
Quality metrics
Re-Routing
rejoining processing
Reliable Path
mobile computing
Resiliency
root nodes
Routing
Routing Protocol
Routing protocols
telecommunication channels
telecommunication network management
telecommunication security
wireless infrastructureless network
GroupKeyManagement
ad hoc environment
Ad hoc networks
Attack detection
authorized nodes
Compositionality
delays
dropped packets
EGSR schemes
group capacity
2ACK scheme
Hybrid based PSO
information transmission
internal attacks
MANET
MANETs
Metrics
mobile ad hoc network
mobile ad hoc networks
biblio
SAODV: Black hole and gray hole attack detection protocol in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:30pm
secure AODV protocol
open nature
Peer-to-peer computing
Protocols
pubcrawl
radio links
resilience
Resiliency
SAODV
mobile nature
security attacks
security problem
standards
telecommunication security
Throughput
wireless links
wireless mobile nodes
Ad hoc networks
mobile computing
mobile ad hoc networks
Metrics
MANET
malicious node
gray hole attacks
gray hole attack detection protocol
Gray hole attack
forwarding packets
delays
Cryptographic Protocols
Compositionality
Black hole attack
Attack detection
AODV
biblio
Impact of unreliable positioning in location-based routing protocols for MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
unreliable positioning
tools
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
quality of service
pubcrawl
privacy
positioning error
node scalability
network overhead
network lifetime
Ad hoc networks
mobile ad hoc networks
Metrics
MANET
location-based routing protocols
Energy Efficiency
effective routing
DYMOselfwd
DYMO
Data Security
data privacy
Compositionality
AODV-Line
AODV
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
Proactive secret sharing for long lived MANETs using Elliptic Curve Cryptography
Submitted by grigby1 on Wed, 06/20/2018 - 12:22pm
Ad hoc networks
bi-variate polynomial
Compositionality
Elliptic curve cryptography
MANET
Metrics
mobile ad-hoc network
mobile computing
proactive
Protocols
pubcrawl
resilience
Resiliency
secret sharing technique
security
threshold cryptography
biblio
Audit-based efficient accountability for node misbehavior in wireless sensor network
Submitted by grigby1 on Mon, 06/11/2018 - 3:39pm
Routing
network functions
network nodes
node behavior
node misbehavior
Peer-to-peer computing
pubcrawl
resilience
Resiliency
network accountability
selective packet droppers
self-organized networks
spread spectrum communication
telecommunication network management
telecommunication network routing
Wireless Sensor Network
wireless sensor networks
Ad hoc networks
multihop ad hoc networks
multichannel networks
Monitoring
mobile ad-hoc networks
mobile ad hoc networks
misbehaving nodes
Metrics
faulty nodes
Cryptography
continuous packet droppers
composability
behavioral audits
Audit-based Misbehavior Detection
audit-based efficient accountability
AMD
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »