Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ad hoc network
biblio
An Energy Efficient Security Aware Clustering approach using Fuzzy Logic for Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 1:00pm
MANET
telecommunication security
telecommunication power management
SFLC
security-aware fuzzy-based clustering
security
resilience
pubcrawl
pattern clustering
network topology
mobile adhoc networks
mobile ad hoc networks
manet privacy
Fuzzy logic
energy efficient security aware clustering approach
energy conservation
Energy
computation time
clustering
cluster head selection
ad hoc network
Compositionality
Metrics
Resiliency
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
biblio
Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
Submitted by grigby1 on Thu, 10/29/2020 - 11:57am
Public key
wireless technology
trust value
time analysis
threshold cryptography
telecommunication security
space analysis
Servers
robust cryptography scheme
Resiliency
resilience
Receivers
public string based threshold cryptography
public key cryptography
ad hoc network
pubcrawl
PSTC
mobile ad hoc networks
mobile ad hoc network
Metrics
message privacy
manet privacy
MANET
denial-of-service attack
denial of service
default threshold value
data privacy
Compositionality
biblio
Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Hybrid Security Method
AODV protocol
AOMDV
AOMDV protocol
AOMDV routing protocol
appropriate routes
Diffie-Hellman algorithm
Diffie-Hellman key exchange algorithm
Distance vector routing protocols
ad hoc network
Normalized Routing Load
on-demand routing protocols
SHA-3 algorithm
single route discovery
useful internet protocol
wireless ad hoc networks
MANET Attack Detection
message passing
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
Routing
computer science
Routing protocols
security
Compositionality
AODV
Black hole attack
MANET
mobile ad hoc networks
detection
mobile ad hoc network
biblio
Wormhole attack detection in ad hoc network using machine learning technique
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
machine learning algorithms
wormhole attack detection
wormhole attack
Training
telecommunication security
Task Analysis
stochastic gradient descent
security
Resiliency
Peer-to-peer computing
Naive Bayes
multiple wormhole tunnels
Metrics
machine learning technique
pubcrawl
machine learning
learning (artificial intelligence)
final task
Feature Selection
false alarm rate
detection rate
data generation
data collection operation
Compositionality
Ad hoc networks
Ad Hoc Network Security
ad hoc network environment
ad hoc network
biblio
SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
mobility conditions
ACO
ad hoc network
ant colony optimisation
Ant colony optimization
guaranteed QoS performance
Malicious Attacker
malicious attackers
MANET open nature network
MANET routing protocols
mobile nodes
opportunistic routing protocol
QoS aware protocol
QoS improvement algorithm
RSSI measurements
Secure-QMAA
security Algorithm
security-QoS mobility aware ACO routing protocol
SQMAA
RSSI
authorisation
Data Security
telecommunication security
security
network security
Resiliency
pubcrawl
Routing protocols
Routing
Scalability
Swarm Intelligence
quality of service
secure communication
mobile ad hoc networks
Blackhole attack
mobility management (mobile radio)
DoS attacks
user authentication
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator
biblio
Redundancy management in heterogeneous wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:58pm
query success probability
wireless sensor networks
Wireless Sensor Network
unreliable nodes detection
Tin
telecommunication network reliability
source node
signal processing
signal dissemination
Reliability
redundancy management algorithm
Redundancy
queueing theory
ad hoc network
query reliability
quality of service
probability
network efficiency
multipath routing
intrusion tolerance
Indexes
heterogeneous wireless sensor networks
geographical area
destination node
Ad hoc networks
« first
‹ previous
1
2