Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
multihop communication
biblio
Collaboration-Based Location Privacy Protection Method
Submitted by grigby1 on Thu, 08/13/2020 - 4:34pm
collaboration
Servers
pubcrawl
Human behavior
resilience
Resiliency
data privacy
privacy
composability
Switches
quality of service
Metrics
query processing
anonymity
groupware
anonymity requirement
anonymous group
anonymous location
collaboration-based location privacy protection method
collaborative users
information entropy
location anonymity
location privacy
location-based
maximum anonymity value set
multihop communication
personalized anonymity
privacy protection algorithm
query block exchange
query diversity
query information
random-QBE
Services
spread spectrum communication
user collaboration
user cooperative privacy protection
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
security of data
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
Immune system
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
artificial immune systems
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
cheat nodes
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
AODV
attack mitigation
black-hole attack mitigation techniques
Blackhole
byzantine attacks
clustering
Compositionality
Conferences
cross checking
data packets
delays
destination nodes
high destination sequence number
IDS
MANET
Metrics
mobile ad hoc networks
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
Resiliency
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field