Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc networks
biblio
Impact of unreliable positioning in location-based routing protocols for MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
mobile computing
unreliable positioning
tools
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
quality of service
pubcrawl
privacy
positioning error
node scalability
network overhead
network lifetime
Ad hoc networks
mobile ad hoc networks
Metrics
MANET
location-based routing protocols
Energy Efficiency
effective routing
DYMOselfwd
DYMO
Data Security
data privacy
Compositionality
AODV-Line
AODV
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
Elimination of internal attacksfor PUMA in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
multicast protocols
telecommunication security
single sender node
security
Routing protocols
Routing
Resiliency
resilience
receiver nodes
PUMA
pubcrawl
Protocol for Unified Multicasting through Announcements
network resources
multicast routing protocol
communication costs
multicast communication
multicast announcement packet fabrication attack
multicast activity-based overhearing technique
mobile ad hoc networks
Metrics
MANET
MA FabricationAttack
Key exchange
internal attacks
Group communication
fabrication
Conferences
Compositionality
biblio
Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
Routing protocols
nods defection
open wireless medium
packet drop rate
packet dropping attack
packet forwarding
pubcrawl
reactive routing protocols
resilience
Resiliency
Routing
nodes unreliability
routing rules
security
self-configuring automatic vehicles
selfish behaviours
Selfish nodes
T-MANET
Tactical MANET
Tactical Mobile Ad-hoc NETworks
telecommunication security
Wireless communication
MANET
attack model
black hole
Compositionality
DSR routing protocol
energy consumption rate
gray hole
high dynamic network architecture
insider threat model
Insider Threats
malicious insider threats
Ad-Hoc Network
Measurement
Metrics
mobile ad hoc network
mobile ad hoc networks
network flow
Network Simulator 2
network throughput
nodes cooperation
nodes misbehavior
biblio
A new anti-jamming reliable routing protocol for tactical MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
Routing protocols
neighboring node
node mobility
pubcrawl
Reliability
resilience
Resiliency
Routing
Routing Protocol
neighbor dependency
security
tactical communications
Tactical MANET
Tactical MANETs
telecommunication network reliability
telecommunication security
Wireless communication
Anti-jamming
mobile ad hoc networks
military communication
Metrics
Measurement
MANET
malicious jamming attacks
link stability evaluation
jamming interference
Jamming
Interference
exponential smoothing estimation
data transmission reliability
Compositionality
channel state information
anti-jamming reliable routing protocol
biblio
Intrusion detection systems in MANETs using hybrid techniques
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
RSA algorithm
mobile ad hoc networks
pubcrawl
public key cryptography
resilience
Resiliency
Routing
Routing protocols
RSA
Metrics
security
security of data
self organized wireless technologies
SHA 256 hashing technique
telecommunication security
ZRP
ZRP routing protocol
AES
MANET
intrusion detection system technique
Intrusion Detection
IDS technique
hybrid cryptographic technique
enhanced adaptive acknowledgement
EAACK
data authentication
Cryptography
Cryptographic Protocols
Compositionality
base station
AODV routing protocol
AODV
AES algorithm
biblio
A generic request/reply based algorithm for detection of blackhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
Mobile Ad Hoc Network technology
Vulnerability
telecommunication security
Technological innovation
security
RREP packet
Routing protocols
Robustness
Resiliency
resilience
RERR packet
pubcrawl
Monitoring
mobile ad hoc networks
Attack detection
Metrics
MANET nodes
MANET
malicious node
legitimate node
IP networks
generic request/reply
Compositionality
communication policy
collaboration
Blackhole attack
attacks
attackers
biblio
Audit-based efficient accountability for node misbehavior in wireless sensor network
Submitted by grigby1 on Mon, 06/11/2018 - 2:39pm
Routing
network functions
network nodes
node behavior
node misbehavior
Peer-to-peer computing
pubcrawl
resilience
Resiliency
network accountability
selective packet droppers
self-organized networks
spread spectrum communication
telecommunication network management
telecommunication network routing
Wireless Sensor Network
wireless sensor networks
Ad hoc networks
multihop ad hoc networks
multichannel networks
Monitoring
mobile ad-hoc networks
mobile ad hoc networks
misbehaving nodes
Metrics
faulty nodes
Cryptography
continuous packet droppers
composability
behavioral audits
Audit-based Misbehavior Detection
audit-based efficient accountability
AMD
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »