Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
wireless technology
biblio
Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs
Submitted by
grigby1
on Mon, 09/09/2019 - 9:56am
Ad hoc networks
base station
blackhole attacks
Compositionality
MANET protocol stack
MANET security
MANET topology
MANETs Attacks
MANETs Security
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
mobile nodes
pubcrawl
resilience
Resiliency
router
Routing
Routing protocols
security
security challenges
telecommunication network topology
telecommunication security
wireless technology
biblio
Wireless Security Audit Penetration Test Using Raspberry Pi
Submitted by
grigby1
on Mon, 07/01/2019 - 9:03am
auditing
authorisation
authorized wireless communications
Communication system security
deliberate jamming
Human behavior
Human Factors
Jamming
man in the middle
penetration tester
Penetration Testing
pubcrawl
Raspberry Pi 3 module
resilience
Resiliency
Scalability
Security Audits
telecommunication security
tools
WiFi attacks
WiFi Auditor
WiFi network
WiFi testing tools
Wired Equivalent Privacy
Wireless fidelity
wireless LAN
wireless networks
Wireless Protected Access
wireless security audit
wireless technology
biblio
Resilient wireless communication networking for Smart grid BAN
Submitted by
BrandonB
on Fri, 05/01/2015 - 8:43am
backbone networks
building area network
control centre
demand response function
distribution level
DR communication
end to end delay
home area network
home automation
home networks
hybrid deployment
IEEE 802.11 communication technology
IEEE 802.11 Standards
Infrastructure mode
infrastructure mode smart meter network
infrastructure single hop topology
mesh multiple hop topology
Multi-hop mesh network
network failure
network reliability
network security
network topology
Redundancy
resilience
resilient wireless communication networking
round trip time
RTT
sensor placement
Single-hop network
smart grid BAN
Smart Grids
smart meters
smart power grids
telecommunication network reliability
telecommunication network topology
telecommunication security
Wireless communication
wireless LAN
wireless technology
biblio
Security applications challenges of RFID technology and possible countermeasures
Submitted by
BrandonB
on Thu, 04/30/2015 - 1:17pm
antennas
Communication channels
frequency allocation
ICT
information and communication technology
information technology
integrated circuits
Intelligent systems
ISO standards
Management
Product Code
product code technology
radiofrequency identification
RFID
RFID reader
RFID tag
security
telecommunication security
warfare machinery
wireless technology
biblio
Machine-to-Machine Communication
Submitted by
BrandonB
on Thu, 04/30/2015 - 11:39am
wireless technology
wireless sensor networks
Wireless communication
supply chain management
supply chain cost optimization
software engineering
smart machinery
Ad hoc networks
smart factory
resource planning
production optimization
Production facilities
production engineering computing
optimised production technology
machine-to-machine communication
machine-to-machine
M2M communication
green computing
factory automation
enterprise systems
enterprise resource planning
embedded systems
Communication system security