Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Routing
biblio
A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT
Submitted by grigby1 on Fri, 04/09/2021 - 11:36am
Internet of Things
security
IoT
IP networks
Peer-to-peer computing
pubcrawl
Resiliency
computer network security
wireless sensor networks
composability
Routing
data packets
Routing protocols
resilience
WSN
telecommunication network topology
Blackhole attack
IDS
Routing Protocol
network performance
network reliability
Black hole attackers
count data
destination data delivery
exchange data routing
expected IDS
L-IDs
L-IDS procedure
LHV value
Link Hop Value-based Intrusion Detection System
routing loops
RPL performance
RPL Routing
RPL routing security scheme
sensor devices
sensor nodes
wireless link
biblio
Reducing Processing Delay and Node Load Using Push-Based Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:31pm
Scalability
Servers
telecommunication traffic
Resiliency
pubcrawl
Routing
internet
Distributed databases
telecommunication network routing
network traffic
Routing protocols
Load modeling
delays
ICN
information-centric networking
named data networking
Information Centric Networks
edge node
faces
content distribution method
contents deliver
node load
packet processing delay time
pull-type communication method
push-based information-centric networking
push-type communication method
returns data
specific content
biblio
Testbed-based Performance Evaluation of the Information-Centric Network
Submitted by aekwall on Thu, 04/08/2021 - 4:28pm
Scalability
telecommunication traffic
security
performance evaluation
mobile computing
computer network management
Resiliency
pubcrawl
Routing
internet
Load modeling
information and communication technology
ICN
information-centric networking
Information Centric Networks
Internet architecture
in-network caching
improved security
mobility support
content retrieval
basic CCN architecture
caching
CCN
computer network performance evaluation
content delivery time
content transfer time
efficient network management
fast content delivery
ICN concept
ICN network
Internet usage
multimedia applications
Multimedia systems
naming
performance requirements
testbed
testbed architecture
testbed-based performance evaluation
traffic load control
biblio
Design and Implementation of MobilityFirst Future Internet Testbed
Submitted by grigby1 on Tue, 03/16/2021 - 2:10pm
clean slate
collaboration
future Internet architecture
Human behavior
internet
Metrics
MF Proxy
MobilityFirst
policy-based approach
Protocols
pubcrawl
resilience
Resiliency
Routing
Scalability
Science - general
testbed
testing
US government
biblio
An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:04pm
telecommunication security
Resiliency
pubcrawl
Routing protocols
wireless sensor networks
graph theory
Routing
Reliability
delays
Switches
WSN
spectrum availability
Routing Protocol
source node
cognitive radio
secured communication
Ad hoc networks
channel availability
cognitive radio sensor networks
dynamic behavior
efficient reactive routing protocol
efficient routing performance
mobility pattern
secured paths
shared common channels
spectrum awareness
stable paths
stable transmission path
V2V communications
weighted graph problem
Cognitive Radio Security
biblio
Detection and Prevention of Black Hole Attack in SUPERMAN
Submitted by aekwall on Tue, 03/09/2021 - 12:39pm
Scalability
security
Resiliency
pubcrawl
Routing
Routing protocols
Telecommunications
Ad hoc networks
mobile computing
wireless networks
Black hole attacks
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
Scalability
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
radio networks
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
cognitive radio
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
protocol selection
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
biblio
Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
a data packet
Ad-doc On-Demand Distance Vector (AODV) protocol
Ad-hoc On-demand Distance Vector
and trust-based scheme
Attacker node
Black hole attack
Black hole attacks
black-hole attack
data packet
data retrieval
data transaction
Energy states
MANET
mobile ad hoc network
mobile ad hoc networks
mobile nodes
node data transfer mechanism
packet delivery ratio
pubcrawl
reactive protocol
Resiliency
Routing
routing environment
Routing Protocol
Routing protocols
Scalability
telecommunication security
trust-based routing
trust-based routing scheme
biblio
Security methods against Black Hole attacks in Vehicular Ad-Hoc Network
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
security
Scalability
Resiliency
pubcrawl
Routing
vehicular ad hoc networks
Communication system security
Routing protocols
Intrusion Detection
Heuristic algorithms
Black hole attacks
black hole
Vehicular Ad-hoc Network
biblio
A Review on Prevention and Detection Schemes for Black Hole Attacks in MANET
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
Scalability
telecommunication security
Resiliency
pubcrawl
Routing protocols
Routing
collaboration
delays
quality of service
MANET
mobile ad hoc networks
telecommunication network topology
mobile ad hoc network
Black hole attack
ad hoc network
Black hole attacks
black hole attack detection
black hole attack prevention
changing topology
Performance Metrics
1
2
3
4
5
6
7
8
9
…
next ›
last »