Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
sybil nodes
biblio
Analysis of Realistic Attack Scenarios in Vehicle Ad-Hoc Networks
Submitted by grigby1 on Mon, 03/02/2020 - 12:37pm
advanced attacks
attacks
automotive transportation
Autonomous Driving
common attacks
composability
disruptive innovations
Driver assistance systems
inter-vehicular communication
Metrics
OMNET++
OMNeT++ simulation environment
pubcrawl
realistic attack scenarios
replay attack
resilience
Resiliency
security
security countermeasures
Sybil attack
sybil attacks
sybil nodes
technological development
telecommunication security
unprecedented security concerns
V2V
VANET
vehicle ad-hoc networks
vehicle connectivity
vehicular ad hoc networks
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
peer to peer security
component
composability
computer network security
data availability
Licenses
logically connected hosts
malicious data
Metrics
overlay networks
p2p
peer
Peer-to-peer computing
peer-to-peer network overlays
peer–
proactive
pubcrawl
radio frequency allocation incensing
resource management
Servers
simulation
Social network services
Sybil attack
sybil attacks
sybil defense scheme
sybil nodes
to–
trusted nodes
biblio
Sybil attack in IOT: Modelling and defenses
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
ad hoc on-demand distance vector
AODV
behavioural profiling
composability
computer network security
defense mechanism
delays
EAODV
EAODV protocol
enhanced AODV protocol
information technology
Internet of Things
IoT network
legitimate nodes
Metrics
neighbouring nodes
Peer-to-peer computing
pubcrawl
Resiliency
Routing
Routing protocols
security
sybil attacks
sybil nodes
Throughput
trust value