Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc networks
biblio
A Time Interval Based Blockchain Model for Detection of Malicious Nodes in MANET Using Network Block Monitoring Node
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
Block Analysis
Compositionality
Conferences
data communication
malicious node detection
MANET Attack Detection
Metrics
mobile ad hoc networks
Monitoring
Network Block Monitoring Node
pubcrawl
resilience
Resiliency
Routing
routing table
Time Interval Based Blockchain Model
biblio
Wormhole Formation and Simulation in Dynamic Source Routing Protocol using NS3
Submitted by aekwall on Mon, 08/02/2021 - 3:12pm
security
simulation
Packet loss
Routing
mobile ad hoc networks
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
Routing protocols
Dsr
NS3 simulation
wormhole attack
MANET security
biblio
Direct Trust-based Detection Algorithm for Preventing Jellyfish Attack in MANET
Submitted by aekwall on Mon, 08/02/2021 - 3:11pm
MANET Attack Detection
wireless sensor networks
Throughput
security
Resiliency
pubcrawl
mobile ad hoc networks
Metrics
MANET security
manet attack prevention
MANET
Jellyfish Attack
Direct Trust based Detection.
delays
cyber security
Conferences
Compositionality
Aerospace electronics
biblio
Role of Ubiquitous Computing and Mobile WSN Technologies and Implementation
Submitted by aekwall on Wed, 07/07/2021 - 4:46pm
secure communication
Resiliency
Metrics
Scalability
pubcrawl
Ubiquitous Computing Security
ubiquitous computing
Smart Home
Smart City
security
Mobile wireless sensor networks
mobile ad hoc networks
military computing
Games
data privacy
wireless sensor networks
Human Factors
Monitoring
biblio
Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
mobile ad hoc networks
trust-based routing scheme
trust-based routing
telecommunication security
Scalability
Routing protocols
Routing Protocol
routing environment
Routing
Resiliency
reactive protocol
pubcrawl
packet delivery ratio
node data transfer mechanism
mobile nodes
Trust Routing
mobile ad hoc network
MANET
Energy states
data transaction
data retrieval
data packet
black-hole attack
Black hole attacks
Black hole attack
Attacker node
and trust-based scheme
Ad-hoc On-demand Distance Vector
Ad-doc On-Demand Distance Vector (AODV) protocol
biblio
Analysis of Different Black Hole Attack Detection Mechanisms for AODV Routing Protocol in Robotics Mobile AdHoc Networks
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
Resiliency
telecommunication security
security attacks
Scalability
Routing protocols
Routing attack
router
route disclosure procedure
robotics mobile ad-hoc networks
Robotics MANETs
robotics MANET environment
MANET Attack Detection
removal mechanisms
pubcrawl
mobile ad hoc networks
malicious station attack
Black hole attacks
black hole attack detection mechanisms
BH finding
BH attack
AODV routing protocol
Ad-hoc On-demand Distance Vector
biblio
A Review on Prevention and Detection Schemes for Black Hole Attacks in MANET
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
mobile ad hoc network
telecommunication security
telecommunication network topology
Scalability
Routing protocols
Routing
Resiliency
quality of service
pubcrawl
Performance Metrics
mobile ad hoc networks
manet attack prevention
MANET
delays
collaboration
changing topology
Black hole attacks
black hole attack prevention
black hole attack detection
Black hole attack
ad hoc network
biblio
Solutions to Black Hole Attacks in MANETs
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
mobile computing
ZRP
self-organising networks
original routing protocol
numerous routing protocols
importance each day
black hole attack solutions
Black hole attacks
OLSR
Dsr
AODV
black holes
Black hole attack
Energy Efficiency
security
Ad hoc networks
Throughput
mobile ad hoc networks
MANET
testing
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
Scalability
RPL
biblio
Mitigation Technique for Black hole Attack in Mobile Ad hoc Network
Submitted by aekwall on Tue, 03/09/2021 - 12:36pm
mobile ad hoc networks
Random Mobility
network scenario
Gray hole attack
device communication
Black hole attacks
Black hole attack
mitigation technique
mobile ad hoc network
Throughput
Scalability
quality of service
delays
Routing protocols
Wireless communication
Routing
pubcrawl
Resiliency
telecommunication security
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 1:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »