Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Sybil attack
biblio
Intrusion Detection of Sinkhole Attack in Underwater Acoustic Sensor Networks
Submitted by grigby1 on Fri, 05/06/2022 - 4:32pm
Scalability
Sinkhole
Selective Forwarding(SF)
Water pollution
Underwater acoustic sensor network(UASN)
Sybil attack
Sea measurements
Underwater Networks
navigation
security
Metrics
Oceans
Routing
Protocols
Resiliency
resilience
pubcrawl
biblio
Sybil Attacks and Defense on Differential Privacy based Federated Learning
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
deep learning
Training
security
pubcrawl
resilience
Resiliency
privacy
composability
Perturbation methods
Metrics
differential privacy
Collaborative Work
federated learning
sybil attacks
Sybil attack
biblio
The Impact of Sybil Attacks on Vehicular Fog Networks
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
Metrics
Vehicular fog computing
IoV
sybil attacks
Sybil attack
Fog computing
Mathematics
vehicular ad hoc networks
Time factors
Internet of Things
composability
privacy
Safety
Resiliency
resilience
pubcrawl
security
biblio
Detecting Sybil Attack, Black Hole Attack and DoS Attack in VANET Using RSA Algorithm
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
Metrics
wireless sensor networks (WSN)
Sybil attack
sybil attacks
Black hole attack
AODV protocol
DoS attack
Routing protocols
vehicular ad hoc networks
tools
composability
wireless sensor networks
Throughput
Heuristic algorithms
Resiliency
resilience
pubcrawl
security
biblio
Sybil Attack Simulation and Mitigation in UnetStack
Submitted by grigby1 on Wed, 03/23/2022 - 11:33am
Resiliency
Water pollution
UnetStack
Underwater acoustic sensor network(UASN)
sybil attacks
Sybil attack
security
Sea measurements
Routing
threat mitigation
resilience
pubcrawl
Protocols
Prediction algorithms
Oceans
Mitigation strategy
Metrics
composability
biblio
A Novel Sybil Attack Detection and Prevention Mechanism for Wireless Sensor Networks
Submitted by grigby1 on Wed, 03/23/2022 - 11:33am
Routing
MITM Attack
Elliptic curve cryptography
Diffie-Hellman key exchange
sybil attacks
AOMDV
Sybil attack
Signal processing algorithms
Metrics
signal processing
composability
Wireless communication
wireless sensor networks
authentication
Throughput
Resiliency
resilience
pubcrawl
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Trajectory
vehicular communications
vehicular ad hoc network
trusted third party authorities
Sybil attack detection scheme
safety-related services
multistep verification process
multiple forged identities
deep learning based object detection technique
Advanced Driving Assistant System
ADAS sensors
V2V
Laser radar
driver information systems
Sensor Systems
Autonomous Driving
road safety
object detection
sensors
VANET
telecommunication computing
sybil attacks
Metrics
vehicular ad hoc networks
Global Positioning System
Sybil attack
composability
pubcrawl
Resiliency
learning (artificial intelligence)
telecommunication security
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
1
2
3
4
5
next ›
last »