Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ad hoc network
biblio
Machine Learning and Data Mining in Cybersecurty
Submitted by aekwall on Mon, 02/07/2022 - 4:09pm
machine learning
MANET Attack Detection
Intrusion Detection Systems
Cybersecurty Machine learning
ad hoc network
Data mining
Classification algorithms
MANET
Compositionality
Support vector machines
Resiliency
Metrics
pubcrawl
Wireless communication
machine learning algorithms
Training
Intrusion Detection
biblio
A Review on Prevention and Detection Schemes for Black Hole Attacks in MANET
Submitted by aekwall on Tue, 03/09/2021 - 11:37am
mobile ad hoc network
telecommunication security
telecommunication network topology
Scalability
Routing protocols
Routing
Resiliency
quality of service
pubcrawl
Performance Metrics
mobile ad hoc networks
manet attack prevention
MANET
delays
collaboration
changing topology
Black hole attacks
black hole attack prevention
black hole attack detection
Black hole attack
ad hoc network
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 12:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
An adaptive approach for Detecting Blackhole using TCP Analysis in MANETs
Submitted by grigby1 on Mon, 12/28/2020 - 12:03pm
security
mobile radio
multipath
ns2
popular attack
pubcrawl
recent few years
reliable transport layer protocol TCP
resilience
Routing protocols
mobile ad-hoc network
self-configuring
society amd researchers
TCP
TCP analysis
telecommunication network reliability
telecommunication security
transport protocols
unstructured networks
Blackhole attack
Resiliency
Metrics
Compositionality
ad hoc network
Ad hoc networks
adaptive approach
Adhoc network
AODV
manet privacy
central controlling authority
different circumstance
dynamic absence
information security
infra less environment
MANET
MANETs
mobile ad hoc networks
biblio
Monitoring Algorithm in Malicious Vehicular Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 12:02pm
Monitoring
vehicular ad hoc networks
VANET
threshold value
security
Safety
resilience
pubcrawl
privacy
MANET security
malicious vehicle detection
distrust value
Clustering algorithms
authentication
ad hoc network
Compositionality
Metrics
Resiliency
biblio
Performance Evaluation of DSR Protocol in MANET Untrustworthy Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:02pm
mobile ad hoc networks
untrue nodes
Throughput
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
pernicious hubs
performance evaluation
network security
network attacks
ad hoc network
mobile ad hoc network
Metrics
MANET untrustworthy environment
genuine setting
Dynamic Source Routing (DSR)
DSR protocol
DSR convention
directing convention
Compositionality
Adhoc network
ad hoc systems
biblio
Securing Vehicular Adhoc Network against Malicious Vehicles using Advanced Clustering Technique
Submitted by grigby1 on Mon, 12/28/2020 - 12:02pm
pattern clustering
vehicular adhoc network
vehicular ad hoc networks
VANET network
VANET
unique topics
telecommunication security
telecommunication network topology
security network
security
scientist
Resiliency
resilience
pubcrawl
predictable mobility
ad hoc network
network productivity
mobile radio
Metrics
malicious vehicles
malicious node
high dynamic network
high dynamic nature
good clustering algorithm
emerging topics
Compositionality
clustering technique
CH(cluster head)
advanced clustering technique
Ad hoc networks
biblio
Physical Layer Security in Vehicular Networks with Reconfigurable Intelligent Surfaces
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
smart radio environments
RIS cells
RIS technologies
RIS-based access point
RIS-based relay
RIS-based transmission
RIS-relay
secrecy capacity
security
Signal to noise ratio
Resiliency
source power
telecommunication network reliability
telecommunication security
vehicle-to-vehicle communication
vehicular ad hoc networks
vehicular adhoc network
vehicular communications
vehicular network system models
wireless channels
incident signal
adjustable phase shift
Analytical models
average secrecy capacity
Buildings
Compositionality
dedicated energy source
Double-Rayleigh fading channels
fading channels
important paradigm
ad hoc network
Metrics
Monte Carlo methods
passive elements
physical layer security
pubcrawl
reconfigurable intelligent surface
reconfigurable intelligent surfaces
Relays
resilience
biblio
Network-based Anomaly Intrusion Detection System in MANETS
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
network intrusion detection
wireless networks
wireless network
wireless Adhoc networks
wired environment
telecommunication security
security of data
security
Routing protocols
Resiliency
resilience
pubcrawl
pre-existing unfolding solutions
Network-based anomaly intrusion detection system
Network Simulator-2
network protocols
MANET Attack Detection
mobile radio
mobile adhoc networks
mobile ad hoc networks
Metrics
MANETs
intrusion detection techniques
intrusion detection system
infrastructure-less networks
IDS
fixed wired network
Compositionality
component
Ad hoc networks
ad hoc network
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
1
2
next ›
last »