Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc networks
biblio
Survey on MAC Protocol of Mobile Ad hoc Network for Tactical Data Link System
Submitted by grigby1 on Fri, 08/25/2023 - 11:00am
security
pubcrawl
resilience
Resiliency
Scalability
information technology
Information Centric Networks
Reliability
mobile ad hoc networks
Technological innovation
Media Access Protocol
System performance
MAC protocol
mobile ad hoc network (MANET)
Network Centric Warfare
Tactical Data Link
biblio
Game Theory Based Multi-agent Cooperative Anti-jamming for Mobile Ad Hoc Networks
Submitted by grigby1 on Fri, 08/04/2023 - 11:16am
reliability theory
multi-agent cooperation
Markov game
Anti-jamming
game theoretic security
distributed
q-learning
Knowledge engineering
Markov processes
mobile ad hoc networks
pubcrawl
simulation
Reinforcement learning
Games
Scalability
Heuristic algorithms
Metrics
Human Factors
Human behavior
biblio
An Efficient Distributed Secured Broadcast Stateless Group Key Management Scheme for Mobile Ad Hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 6:29pm
Hash functions
simulation
security
resilience
pubcrawl
Performance analysis
mobile computing
mobile ad hoc networks
interpolation
Informatics
key management
Group key management
composability
Broadcast stateless
Ad Hoc Network Security
Human behavior
Metrics
Resiliency
Scalability
pub-crawl
biblio
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory
Submitted by grigby1 on Fri, 08/26/2022 - 3:06pm
security
pubcrawl
Human behavior
Human Factors
Resiliency
Indexes
Scalability
Ad hoc networks
Data processing
computational intelligence
Rough sets
Control Theory
effectiveness evaluation
mobile ad hoc networks
rough set theory
biblio
To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
Compositionality
mobile computing
Monitoring
pubcrawl
Routing
Routing protocols
manet attack prevention
Resiliency
Metrics
mobile ad hoc networks
AODV
AODV protocol
Black hole attack
data transfer
Detection and Prevention.
MANET
MANET Attack Detection
biblio
Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol
Submitted by aekwall on Mon, 12/20/2021 - 12:20pm
mobile ad hoc networks
vehicular networks
V2V communications
Routing protocols
Routing
Resiliency
Reliability
pubcrawl
performance evaluation
Ad Hoc Network Security
Metrics
Conferences
computer network reliability
Compositionality
communication protocols
cognitive radio ad-hoc networks
Ad hoc networks
biblio
Black Hole Attack in Mobile Ad Hoc Network and its Avoidance
Submitted by aekwall on Mon, 12/20/2021 - 12:19pm
wireless networks
Routing protocols
Routing
pubcrawl
mobile nodes
mobile ad hoc networks
MANET – Mobile Ad Hoc Network
DSSR – Destination Sequence Routing
DSR – Dynamic Source Routing
DoS – Denial of Service
AODV – On Demand Distance Vector Routing
Ad Hoc Network Security
Compositionality
Metrics
Resiliency
manet attack prevention
biblio
A Trust Based Scheme for Spotting Malicious Node of Wormhole in Dynamic Source Routing Protocol
Submitted by grigby1 on Mon, 11/08/2021 - 4:48pm
pubcrawl
composability
Cryptography
delays
Dsr
Hardware
MANET
mobile ad hoc networks
NS3 simulation
wormhole attack
resilience
Resiliency
Routing
Routing protocols
Scalability
Task Analysis
Trust Routing
biblio
Power and Trust Based Routing for MANET Using RRRP Algorithm
Submitted by grigby1 on Mon, 11/08/2021 - 4:48pm
resilience
pubcrawl
multi-hop
mobile ad hoc networks
Industry applications
egoistic
drop fraction
Conferences
composability
appropriateness
Trust Routing
Throughput
Scalability
Routing protocols
Routing
Resiliency
biblio
Detection and Prevention of Wormhole Attack Using the Trust-Based Routing System
Submitted by grigby1 on Mon, 11/08/2021 - 4:47pm
Warm Hole Attack
Trust Routing
Trust-Based System
Scalability
Routing protocols
Routing
Resiliency
resilience
pubcrawl
multi-path routing
mobile ad hoc networks
mobile ad hoc network
encryption
composability
ad hoc on-demand distance vector
1
2
3
4
5
6
7
8
9
…
next ›
last »