Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
sensor security
biblio
Features of Application of Data Transmission Protocols in Wireless Networks of Sensors
Submitted by
aekwall
on Mon, 02/17/2020 - 1:35pm
computer network security
Internet of Things
Protocols
Software
transport protocols
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Metrics
internet
authentication
sensor security
sensors
internetworking
protocol
sensor networks
queueing theory
data
certificate-based authentication
data transmission protocols
device authentication protection
gateways
Message Queue Telemetry Transport protocol
messages
network servers
protecting devices
publisher-subscriber architecture
radiotelemetry
secure IoT-solution mechanisms
biblio
Model for Study of Malware Propagation Dynamics in Wireless Sensor Network
Submitted by
aekwall
on Mon, 02/17/2020 - 1:35pm
telecommunication security
malware
invasive software
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Computational modeling
Metrics
Analytical models
detection
sensor security
Stability analysis
security mechanism
Wireless Sensor Network
WSN
computer viruses
critical security challenges
early detection method
Epidemic model
epidemiology basic reproduction number
Equilibrium points
Grippers
malicious signals presence
malware propagation dynamics
malware spread
malware status
neighboring sensor nodes
Propagation
Susceptible-Exposed-Infectious-Recovered-Dead model
biblio
Improve the security over the wireless sensor networks in medical sector
Submitted by
aekwall
on Mon, 02/17/2020 - 1:34pm
Monitoring
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
component
Metrics
internet
secure protocol
sensor security
Ciphers
hospitals
Biomedical monitoring
AES
AES algorithms
body sensor networks
data transfer availability
data transfer confidentiality
data transfer integrity
hospital
medical sector
RC4
RC4 algorithms
WSN
biblio
Will Blockchain Technology Become a Reality in Sensor Networks?
Submitted by
aekwall
on Mon, 02/17/2020 - 1:34pm
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
batteries
wireless sensor networks
Routing
Peer-to-peer computing
sensor nodes
Computational modeling
Metrics
blockchain
resource allocation
telecommunication network routing
sensor security
blockchain technology
battery life
cluster head
cluster heads
computation power
constant bit rate
control overhead reduction
LBMH routing shares
load balancing multihop routing shares
memory storage
private communication blockchain framework
resource-constrained wireless sensor network
security features
sensor networks
biblio
Security in Wireless Sensors Networks
Submitted by
aekwall
on Mon, 02/17/2020 - 1:34pm
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Metrics
telecommunication network routing
sensor security
route discovery
Routing protocols
secure routing mechanisms
wireless sensors networks
biblio
Improving Wireless Network Security Based On Radio Fingerprinting
Submitted by
aekwall
on Mon, 02/17/2020 - 1:34pm
authorisation
telecommunication security
security
feature extraction
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Communication system security
wireless devices
Metrics
Transient analysis
Signal to noise ratio
security threats
sensor security
wireless networks
identity authentication
Fourier transforms
fractional fourier transform
physical characteristics
radio fingerprinting
radio frequency fingerprint extraction
Radio Frequency Fingerprints
radio transmitters
transient signals
wireless device transmitters
Wireless Network Security
biblio
New Approach to Secure Cluster Heads in Wireless Sensor Networks
Submitted by
aekwall
on Mon, 02/17/2020 - 1:34pm
Monitoring
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
sensor nodes
Metrics
Clustering algorithms
probability
genetic algorithms
security threats
sensor security
Topology
data aggregation
malicious attacks
cluster head
resource constraints
Aggregation
Cluster.
cryptographic algorithm
genetic algorithm based search
Head
hierarchical architecture security
inter-cluster communication
intra-cluster communication
multihop approach
node failure probability
overhead communication
overhead computation
secured WSN deployment
wireless links
Wireless Sensor Network
biblio
Security on Wireless Sensor Network
Submitted by
aekwall
on Mon, 02/17/2020 - 1:34pm
attack
composability
Human behavior
low-cost sensor nodes
Metrics
placement algorithm
pubcrawl
Resiliency
security
sensor placement
sensor security
telecommunication network routing
telecommunication security
Wireless Sensor Network
wireless sensor network security
wireless sensor networks
biblio
Wireless Sensor Networks Security: Case study
Submitted by
aekwall
on Mon, 02/17/2020 - 1:33pm
IoT
Cloud Computing
encryption
Internet of Things
telecommunication security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Metrics
secure communication
sensor security
Data collection
Elliptic curve cryptography
wireless
power consumption
Network
data
data exchange
live monitoring
network physical devices
Sensor
sensor data detection
wireless sensor networks security
biblio
Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
Submitted by
aekwall
on Mon, 02/17/2020 - 1:33pm
cluster head
cluster routing protocols
composability
cyber physical systems
delays
diversity coding
encoding
Human behavior
LEACH protocol
low energy adaptive clustering hierarchy
malicious security attacks
Metrics
network coding
Predictive Metrics
Protocols
pubcrawl
reliable transmission scheme
Resiliency
robust recovery schemes
Routing
Routing protocols
security
security attacks
selective forwarding attack
selective forwarding attacks
sensor security
telecommunication network reliability
telecommunication security
Wireless Sensor Network
wireless sensor networks
1
2
3
4
5
next ›
last »