Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad hoc networks
biblio
k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Symmetric matrices
pubcrawl
Resiliency
road vehicles
runtime complexity optimization
Sybil attack
Sybil attack detection
Sybil attack vulnerability
sybil attacks
pseudonymous based privacy protection mechanism
traffic engineering computing
Transmitters
vehicle classification
Vehicle Driving Pattern
vehicle location privacy
vehicular network
vehicular networking
wireless sensor networks
Intrusion Detection
composability
computational complexity
data privacy
driving pattern similarity
Eigenvalues and eigenfunctions
ETSI
IEEE
Intelligent Transportation Systems
Ad hoc networks
k-nearest neighbours classification
kNN classification algorithm
machine learning
Metrics
pattern classification
Peer-to-peer computing
privacy
biblio
Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Safety
vehicular networks
vehicular ad hoc networks
Vehicle driving
sybil attacks
SVM kernel functions based classifiers
Support vector machines
support vector machine based Sybil attack detection method
SUMO simulator
security of data
security
Ad hoc networks
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
learning (artificial intelligence)
Eigenvalues and eigenfunctions
driving pattern matrices
DPM
composability
biblio
Trust-Based Protocol for Securing Routing in Opportunistic Networks
Submitted by grigby1 on Wed, 04/11/2018 - 3:02pm
pubcrawl
trust-based routing protocol
Trust Routing
telecommunication security
telecommunication network topology
store-carry-forward mechanism
securing routing
Scalability
Routing protocols
Routing
Resiliency
resilience
Ad hoc networks
Packet loss
Opportunistic Networks
Mathematical model
malicious nodes
gray-hole attack
end-to-end connection
dynamic network topology
delivery success ratio
composability
black-hole attack
biblio
Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
resilience
WSN communication protocols
wireless sensor networks
telecommunication security
tactical WSN
tactical wireless sensor networks
tactical sensor networks
specific routing protocol
sink-node vulnerability
sensor nodes
sensor networks
security
Routing protocols
Routing
Resiliency
6LoWPAN
remote sensing
reactive routing protocol
pubcrawl
privacy
modified LOADng protocol
military communication
Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol
k-anonymity
IEEE 802.15.4
IEEE 802.15 Standard
enhancing sink node anonymity
Cyber Physical Systems Security
composability
Ad hoc networks
biblio
A generalized optimization framework for control plane in tactical wireless networking
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
optimisation
wireless networks
wireless multihop tactical networking
Transmitters
throughput maximization problem
Throughput
telecommunication control
tactical wireless networking
spread spectrum communication
seamless multihop communications
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy governance
optimization
Ad hoc networks
network layers
multihop tactical wireless networks
military communication
Metrics
Interference
Human Factors
human factor
Human behavior
global network optimization framework
generalized optimization framework
crosslayer optimization framework
control plane
collaboration
clean slate
biblio
Using friendly jamming to improve route security and quality in ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
security performance
pubcrawl
Receivers
Resiliency
route security
Routing
secrecy outage probability
security
Security Metrics
physical layer security technique
service quality metrics
Signal to noise ratio
SOP
telecommunication network reliability
telecommunication network routing
telecommunication security
wireless area network
eavesdroppers
Ad hoc networks
auxiliary variable
composability
connection outage probability
convex optimization problem
convex programming
COP
D2D network
Ad Hoc Network Security
friendly jamming
Human behavior
Human Factors
Interference
Jamming
machine-to-machine communication
Measurement
biblio
A multi-factors security key generation mechanism for IoT
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
multi-factors
self-organising network
self-organising Internet of Things network
self-adjusting systems
security of data
security
Resiliency
pubcrawl
Protocols
multifactors security key generation mechanism
Multi-Level Security
Ad Hoc Network Security
Logic gates
IoT security
IoT nodes
IoT
Internet of Things
Human Factors
Human behavior
Cryptography
composability
Ad hoc networks
biblio
Detection of LSSUAV using hash fingerprint based SVDD
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
IEEE 802.11n Standard
Unmanned Aerial Vehicles
UAV detection
SVDD recognition
Signal to noise ratio
Resiliency
radar detection
pubcrawl
Protocols
novel distance-based support vector data description algorithm
LSSUAV
Acoustic Fingerprints
Human behavior
hash fingerprint based SVDD
hash fingerprint
fingerprint identification
feature extraction
computation complexity
composability
autonomous aerial vehicles
Ad hoc networks
biblio
A model for the analysis of security policies in service function chains
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
virtualisation
Virtual private networks
software tools
software defined networking
Software
SFC
service function chains
Security Policies Analysis
security policies
SDN
Ad hoc networks
program verification
policy-based governance
NFV
network function virtualization
Monitoring
formal model
Cryptography
computer network security
collaboration
Analytical models
biblio
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
Submitted by K_Hooper on Wed, 09/27/2017 - 1:21pm
Ad hoc networks
detection
Human behavior
mobile ad-hoc network
Multi-hope
Prevention
pubcrawl
Resiliency
scalabilty
security
tunneling
wormhole attack
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »