Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc networks
biblio
Neighbor-aware based forwarding strategy in NDN-MANET
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
mobility management (mobile radio)
Wireless communication
Scalability
Resiliency
resilience
pubcrawl
performance evaluation
Packet loss
Neighbor-aware based forwarding strategy
neighbor-aware
NDN-MANET
NDN
named data networking
Named Data Network Security
aware forwarding
mobile ad hoc networks
Memory management
MANET
Internet architecture
internet
Human behavior
hop node
greedy forwarding strategy
greedy algorithms
forwarding strategy
delays
data packet response
blind forwarding
biblio
Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
mobile computing
wireless movable nodes
telecommunication security
Security Heuristics
Scalability
Resiliency
pubcrawl
particle swarm optimization
particle swarm optimisation
network simulator
multiple gray hole attack
mobile nodes
Cooperative Gray Hole attack
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
meta heuristic
MANET
malicious node
intermediate nodes
gray hole attack prevention
data packets
biblio
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
quality-of-service constraints
Yices SMT Solver
Trust Routing
SMT-LIB language
SMT-LIB
security
secure routing protocol
Scalability
Routing protocols
Routing Protocol
routing functions
Routing
Resiliency
resilience
requirement models
requirement constraints
Adaptation models
quality of service
QoS constraints
pubcrawl
network topology
mobile nodes
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
MANET
formal verification
formal modelling
composability
adaptive routing protocol
biblio
Improving Trusted Routing by Identifying Malicious Nodes in a MANET Using Reinforcement Learning
Submitted by grigby1 on Wed, 04/11/2018 - 3:02pm
Protocols
vehicular networks
trusted routing
Trust Routing
trust
telecommunication security
self-organizing communication systems
security
Scalability
Routing
Resiliency
resilience
reliable trust improvement
reinforcement learning agent
Reinforcement learning
pubcrawl
ad-hoc on-demand distance vector protocol
Peer-to-peer computing
mobile conferences
mobile ad-hoc networks
mobile ad hoc networks
military operations
MANET
malicious nodes
malicious behaviour
learning (artificial intelligence)
healthcare systems
dynamic wireless connections
dynamic MANET environment
composability
AODV protocol
AODV
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
biblio
Black hole attack prevention method using dynamic threshold in mobile ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
mobile ad hoc network
telecommunication security
security issues
security attack
Routing protocols
routing information exchange
Routing
Resiliency
pubcrawl
network infrastructure
mobile nodes
mobile ad hoc networks
Ad Hoc Network Security
MANET
malicious node
IP networks
Human Factors
Human behavior
fake routing information
dynamic threshold
data packets
composability
black hole node detection rate
black hole attack prevention method
biblio
Enhancing security for load balanced energy enhanced clustered bee ad hoc network using secret public keys
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
pubcrawl
wireless network
telecommunication security
Security Public Key Cryptography
security
secured PKI scheme
secret public keys
Routing protocols
Routing
resource allocation
Resiliency
public key cryptography
Ad Hoc Network Security
path selection
mobile ad hoc networks
mobile ad hoc network
MANET
load balanced energy enhanced clustered bee ad hoc network
LBEE
Human Factors
Human behavior
Energy Efficiency
composability
biblio
Person Detection Techniques for an IoT Based Emergency Evacuation Assistance System
Submitted by grigby1 on Mon, 06/05/2017 - 12:40pm
Emergency Evacuation
Human behavior
Human Safety
Internet of Things
IoT
manet privacy
mobile ad hoc networks
privacy
pubcrawl
Resiliency
Scalability
security
Security Heuristics
biblio
Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET)
Submitted by grigby1 on Mon, 03/13/2017 - 12:23pm
mobile ad-hoc network
wumpus world concept
wireless mesh networks
telecommunication security
telecommunication network topology
telecommunication network routing
telecommunication network reliability
security enhancement
security
Routing attack
Routing
network topology
network survivability
network partitioning
mobile computing
Mobile communication
AMMNET
mobile ad hoc networks
Mesh networks
MANET
intragroup bridge router
intergroup bridge router
denial of service (dos)
computer architecture
communication reliability
Blackhole attack
Blackhole
bait detection scheme
Bait approach
Autonomous Mobile Mesh Network (AMMNET)
autonomous mobile mesh network
Artificial Intelligence
biblio
Flooding attacks detection in MANETs
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
MANET
traffic generation
telecommunication traffic
statistical analysis
security threats
RREQ flooding attacks
Routing protocols
Routing
route discovery
pubcrawl170109
mobile ad hoc networks
Ad hoc networks
IP networks
flooding attack detection
DoS
denial of service
computer networks
computer network security
Computer crime
AODV
ah hoc on-demand distance vector
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »