Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data communication
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by
grigby1
on Mon, 09/09/2019 - 9:56am
autonomous collection
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
GDH
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
Metrics
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Resiliency
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
biblio
Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices
Submitted by
aekwall
on Mon, 05/20/2019 - 9:02am
authentication
authorisation
computer network security
Cryptographic Protocols
data communication
decryption
encryption
Human behavior
internet
Internet of Things
IoT
IoT devices exchange data
Kerberos
local networks
low-power devices
low-power IoT devices
message authentication
Metrics
Node to node data transmission
node-to-node secure data transmission protocol
Protocols
pubcrawl
public key cryptography
Resiliency
secure data transmission
Symmetric Key Cryptography
transmission protocol
biblio
Research Issues Based on Comparative Work Related to Data Security and Privacy Preservation in Smart Grid
Submitted by
grigby1
on Thu, 03/28/2019 - 2:16pm
data communication
cyber-threat
customer-safety
Cryptography
composability
authorisation
data privacy
Data Security
electric grids
Human behavior
Metrics
NIST
power engineering computing
power system security
privacy
privacy preservation
pubcrawl
secure data communication
Smart Grid
smart grid data communication
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
biblio
Air-Gap Data Transmission Using Screen Brightness Modulation
Submitted by
grigby1
on Thu, 01/31/2019 - 11:12am
Air gaps
air-gap data transmission
Air-gap transmission
Band-pass filters
BFSK
BFSK digital modulation
Brightness
Cameras
composability
computer virus
computer viruses
data communication
data communication channel
Demodulation
Digital demodulation
error statistics
frequency shift keying
Human behavior
Image Processing
Metrics
modulation
Monitoring
pubcrawl
resilience
Resiliency
screen brightness modulation
unidirectional transmission
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by
grigby1
on Mon, 01/21/2019 - 11:31am
Ad Hoc Network Security
ad hoc on-demand multipath distance vector protocol
AOMDV protocol
Blackhole attack
blackhole attacks
blackhole nodes
Compositionality
Cryptographic Protocols
data communication
data forwarding security
data transmission security
encryption
homomorphic encryption scheme
MANET
Metrics
mobile ad hoc network
mobile ad hoc network security
mobile ad hoc networks
mobile nodes
multi-path routing
network throughput
packet delivery ratio
pubcrawl
Receivers
Resiliency
Routing protocols
secure message transmission
telecommunication security
biblio
Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System
Submitted by
grigby1
on Mon, 01/21/2019 - 11:20am
security
pubcrawl
Metrics
Resiliency
Scalability
telecommunication security
Signal to noise ratio
light emitting diodes
optical communication
Apertures
data communication
Data Transmission
eavesdropping
indoor communication
indoor communication performance
lighting
modulation
optical links
optical wireless interception vulnerability analysis
receiver aperture
Receivers
signal to noise ratio threshold
visible light communication system
Visible Light Communications Security
biblio
System architecture for deep packet inspection in high-speed networks
Submitted by
grigby1
on Wed, 09/12/2018 - 10:25am
real-time data analysis
pubcrawl
PeerDirect
Nvidia
Napatech
Mellanox
Inspection
high-speed networks
hardware-software solution
hardware tools
Hardware
graphics processing units
graphics processing unit
GPUDirect
firewall
dpi
DPDK
DMA
deep packet inspection
data volume real-time processing
data transmission networks
data communication
data analysis
CUDA
CPU
computing devices
computer network security
computer network
computer architecture
Central Processing Unit
bit rate 80.0 Gbit/s
resilience
Resiliency
Scalability
software requirements
system architecture
Zero-copy
biblio
The performance comparison of forwarding mechanism between IPv4 and Named Data Networking (NDN). Case study: A node compromised by the prefix hijack
Submitted by
grigby1
on Mon, 06/11/2018 - 2:37pm
computer network
computer network security
data communication
forwarding plane
hijacked node
Human behavior
internet
Internet Protocol version 4
IP
IP networks
IP router
IPv4
Named Data Network Security
named data networking
NDN
network architecture design
network routing
network topology
pubcrawl
resilience
Resiliency
Routing
Routing Information Base
Routing protocols
Scalability
telecommunication network routing
Topology
transport protocols
biblio
Evaluation and analysis of network coding at network layer
Submitted by
grigby1
on Mon, 06/11/2018 - 2:34pm
composability
data communication
Decoding
delay
delays
encoding
end-to-end delay
Metrics
network coding
network layer
network topologies
packet delivery rate
packet radio networks
pubcrawl
real time performance metrics
resilience
Resiliency
telecommunication network topology
Throughput
wireless networks
XOR technique
biblio
Distributed timely-throughput optimal scheduling for wireless networks
Submitted by
el_wehby
on Wed, 05/23/2018 - 5:08pm
arrival rate vectors
carrier sense multiple access
CSMA-type protocols
data communication
Decision Making
delay deadlines
delays
distributed algorithms
distributed timely-throughput optimal scheduling algorithm
incoming traffic rate
maximum network capacity region
maximum network throughput
Optimal scheduling
optimal transmission decision making
radio networks
reliable data delivery
Schedules
Scheduling algorithms
telecommunication scheduling
telecommunication traffic
Throughput
virtual debts
Wireless communication
wireless networks
wireless sensor networks
1446484
1
2
3
next ›
last »