Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
mobile radio
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
Scalability
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
radio networks
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
cognitive radio
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
protocol selection
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
biblio
Evolving Dynamically Reconfiguring UAV-hosted Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:45pm
security
Resiliency
pubcrawl
composability
batteries
wireless sensor networks
Metrics
mobile robots
Training
optimisation
network lifetime
mobile radio
genetic algorithm
genetic algorithms
Bandwidth
Mesh networks
control engineering computing
Path Planning
autonomous aerial vehicles
Base stations
distributed control
remotely operated vehicles
MESH network
bandwidth requirements
different user distributions
evolutionary adaptive network deployment algorithm
evolving dynamically reconfiguring UAV-hosted mesh networks
flying network base stations
initial deployment
overwatch
potential field parameters
potential fields
quick temporary networked communications capabilities
remote areas
reposition UAVs
scouting
tuned potential fields
UAV network
Unmanned Aerial Vehicles
unmanned aerial vehicles networks
user bandwidth coverage
user bandwidth needs
Wireless Mesh Network Security
biblio
Fast Cross Layer Authentication Scheme for Dynamic Wireless Network
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
pubcrawl
Metrics
resilience
Resiliency
message authentication
telecommunication security
Cryptographic Protocols
composability
radio networks
computational complexity
wireless channels
mobile radio
authentication delay
cross layer authentication
dynamic communication scenarios
dynamic wireless communication
dynamic wireless network
fast cross layer authentication scheme
hypothesis test models
lightweight cross-layer authentication scheme
network environments
performance stability
physical layer authentication
physical layer authentication mechanisms
PLA models
spoofing detection
static communications
upper layer assisted method
upper layer authentication
dynamic networks
biblio
An adaptive approach for Detecting Blackhole using TCP Analysis in MANETs
Submitted by grigby1 on Mon, 12/28/2020 - 1:03pm
ad hoc network
Ad hoc networks
adaptive approach
Adhoc network
AODV
Blackhole attack
central controlling authority
Compositionality
different circumstance
dynamic absence
information security
infra less environment
MANET
MANETs
Metrics
mobile ad hoc networks
mobile ad-hoc network
mobile radio
multipath
ns2
popular attack
pubcrawl
recent few years
reliable transport layer protocol TCP
resilience
Resiliency
Routing protocols
security
self-configuring
society amd researchers
TCP
TCP analysis
telecommunication network reliability
telecommunication security
transport protocols
unstructured networks
biblio
Securing Vehicular Adhoc Network against Malicious Vehicles using Advanced Clustering Technique
Submitted by grigby1 on Mon, 12/28/2020 - 1:02pm
ad hoc network
Ad hoc networks
advanced clustering technique
CH(cluster head)
clustering technique
Compositionality
emerging topics
good clustering algorithm
high dynamic nature
high dynamic network
malicious node
malicious vehicles
Metrics
mobile radio
network productivity
pattern clustering
predictable mobility
pubcrawl
resilience
Resiliency
scientist
security
security network
telecommunication network topology
telecommunication security
unique topics
VANET
VANET network
vehicular ad hoc networks
vehicular adhoc network
biblio
Network-based Anomaly Intrusion Detection System in MANETS
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
network intrusion detection
ad hoc network
Ad hoc networks
component
Compositionality
fixed wired network
IDS
infrastructure-less networks
intrusion detection system
intrusion detection techniques
MANETs
Metrics
mobile ad hoc networks
mobile adhoc networks
mobile radio
network protocols
Network Simulator-2
Network-based anomaly intrusion detection system
pre-existing unfolding solutions
pubcrawl
resilience
Resiliency
Routing protocols
security
security of data
telecommunication security
wired environment
wireless Adhoc networks
wireless network
wireless networks
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
security of data
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
wireless LAN
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
covered direction-finding
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
packet loss avoidance
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
biblio
BIAS: Bluetooth Impersonation AttackS
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
authorisation
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
performance evaluation
authentication
Cryptography
Protocols
standards
composability
ubiquitous computing
mobile radio
attacks
wireless security
bluetooth security
authentication procedure
BIAS attacks
Bluetooth chips
Bluetooth devices
Bluetooth Impersonation AttackS
Bluetooth standard
Bluetooth version
impersonation
mandatory mutual authentication
secure authentication procedure
secure connection establishment
slave impersonation attacks
wireless communication pervasive technology
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 1:28pm
RPL
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
mobile radio
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
Routing Protocol
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
IoT enabled smart home environment
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Resiliency
Scalability
Black hole attack
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
black hole AODV
Black hole attacks
Blackhole Attack (BA)
blackhole attack detection
composability
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
mobile ad hoc networks
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Routing protocols
Secure AODV
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
1
2
3
4
5
next ›
last »