Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious node
biblio
A generic request/reply based algorithm for detection of blackhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Mobile Ad Hoc Network technology
Vulnerability
telecommunication security
Technological innovation
security
RREP packet
Routing protocols
Robustness
Resiliency
resilience
RERR packet
pubcrawl
Monitoring
mobile ad hoc networks
Attack detection
Metrics
MANET nodes
MANET
malicious node
legitimate node
IP networks
generic request/reply
Compositionality
communication policy
collaboration
Blackhole attack
attacks
attackers
biblio
Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
mobile computing
wireless movable nodes
telecommunication security
Security Heuristics
Scalability
Resiliency
pubcrawl
particle swarm optimization
particle swarm optimisation
network simulator
multiple gray hole attack
mobile nodes
Cooperative Gray Hole attack
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
meta heuristic
MANET
malicious node
intermediate nodes
gray hole attack prevention
data packets
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
biblio
Black hole attack prevention method using dynamic threshold in mobile ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
mobile ad hoc network
telecommunication security
security issues
security attack
Routing protocols
routing information exchange
Routing
Resiliency
pubcrawl
network infrastructure
mobile nodes
mobile ad hoc networks
Ad Hoc Network Security
MANET
malicious node
IP networks
Human Factors
Human behavior
fake routing information
dynamic threshold
data packets
composability
black hole node detection rate
black hole attack prevention method
biblio
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:02am
NS-2 simulation
wireless ad hoc networks
Wireless ad hoc network
Vectors
trust value
Trust management
telecommunication traffic
security threats
security
Routing protocols
Routing
reactive routing protocol
partial received packets
packet dropping attacks
Packet dropping
Ad hoc networks
network traffic
mobile ad hoc networks
malicious packet dropping
malicious node
low false positive probability
dynamic trust model
DoS attack
denial of service attack
Conferences
Computers
computer network security
Black hole attack
AODV
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
« first
‹ previous
1
2
3