Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wormhole attack
biblio
Deep Learning Technique Based Intrusion Detection in Cyber-Security Networks
Submitted by aekwall on Thu, 01/05/2023 - 5:11pm
Ad hoc networks
wormhole attack
selective forwarding attack
Black hole assault
and Denial-of-Service attack
sybil attacks
Sybil attack
spread spectrum communication
deep learning
Routing protocols
Data models
composability
Resiliency
Metrics
pubcrawl
feature extraction
Artificial Intelligence
Training
Routing
biblio
Wormhole Attack Detecting in Underwater Acoustic Communication Networks
Submitted by grigby1 on Fri, 05/06/2022 - 4:25pm
Resiliency
wormhole attack
Wireless communication
Underwater Networks
Underwater Acoustic Communication Network
simulation
security
Sea measurements
Scalability
Attack detection
resilience
pubcrawl
Oceans
navigation
Metrics
Interference
Azimuth
biblio
A Trust Based Approach to Mitigate Wormhole Attacks in Mobile Adhoc Networks
Submitted by grigby1 on Tue, 02/08/2022 - 11:48am
AODV
MANET security
wormhole attack
trust scheme
law enforcement
Communication Systems
education
Economics
NS-2
MANET
pubcrawl
Compositionality
delays
composability
Throughput
Conferences
Resiliency
resilience
Metrics
biblio
Performance Analysis of Blackhole and Wormhole Attack in MANET Based IoT
Submitted by grigby1 on Tue, 02/08/2022 - 11:47am
Measurement
MANET security
ns-3
MANET-IoT
AODV
wormhole attack
Routing protocols
Blackhole attack
Compositionality
Reliability
Internet of Things
delays
composability
Throughput
Resiliency
resilience
Metrics
pubcrawl
security
biblio
A Trust Based Scheme for Spotting Malicious Node of Wormhole in Dynamic Source Routing Protocol
Submitted by grigby1 on Mon, 11/08/2021 - 4:48pm
pubcrawl
composability
Cryptography
delays
Dsr
Hardware
MANET
mobile ad hoc networks
NS3 simulation
wormhole attack
resilience
Resiliency
Routing
Routing protocols
Scalability
Task Analysis
Trust Routing
biblio
Wormhole Formation and Simulation in Dynamic Source Routing Protocol using NS3
Submitted by aekwall on Mon, 08/02/2021 - 3:12pm
security
simulation
Packet loss
Routing
mobile ad hoc networks
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
Routing protocols
Dsr
NS3 simulation
wormhole attack
MANET security
biblio
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
LN community
wormhole attack
sensitive payment information
security vulnerabilities
security
Scalability
Receivers
quantitative analysis
pubcrawl
privacy
permissionless decentralized cryptocurrencies
payment channel networks
network-wide DoS attack costs
multihop payment protocols
anonymity
Lightning Network
Lightning
Human behavior
denial-of-service attacks
data privacy
Cryptographic Protocols
cryptocurrencies
contracts
concurrent payments
computer network security
channel capacity
bitcoin
anonymity issues
biblio
Performance Evaluation of a Wormhole Detection Method using Round-Trip Times and Hop Counts in RPL-Based 6LoWPAN Networks
Submitted by aekwall on Mon, 12/21/2020 - 1:27pm
Intrusion Detection
RPL
pubcrawl
composability
6LoWPAN
Internet of Things
wormhole attack
Resiliency
biblio
Wormhole Attack Detection using Energy Model in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:22am
node energy
dynamic route discovery
dynamic route request
encrypted values
energy level
energy model
high power transmission
intruder nodes
network analysis
dynamic request
NS2 simulator
packet drop ratio
performance curves
static table driven technique
unsecure transmission
wormhole attack detection
MANET Attack Detection
wormhole attacks
pubcrawl
Metrics
resilience
Resiliency
telecommunication network routing
Compositionality
network communication
wormhole attack
Cryptography
AODV
end to end delay
MANETs
mobile ad hoc networks
AODV routing
Apptool
Apptool simulator
biblio
Wormhole attack detection in ad hoc network using machine learning technique
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
machine learning algorithms
wormhole attack detection
wormhole attack
Training
telecommunication security
Task Analysis
stochastic gradient descent
security
Resiliency
Peer-to-peer computing
Naive Bayes
multiple wormhole tunnels
Metrics
machine learning technique
pubcrawl
machine learning
learning (artificial intelligence)
final task
Feature Selection
false alarm rate
detection rate
data generation
data collection operation
Compositionality
Ad hoc networks
Ad Hoc Network Security
ad hoc network environment
ad hoc network
1
2
3
next ›
last »