Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc networks
biblio
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Mean field game
telecommunication security
system resources
strategic security defence decisions
security game model
security enhancements
security
mobile computing
mobile ad hoc networks
mobile ad hoc network (MANET)
mean field game theoretic approach
Ad hoc networks
mathematical tool
Mathematical model
MANETs
Games
game theory
fully distributed scheme
Equations
centralized administration
Approximation methods
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs
Submitted by BrandonB on Tue, 05/05/2015 - 11:18am
moving target defense mechanism
Wireless communication
telecommunication network reliability
tactical cognitive radio MANET
source selective jamming attack combation
source selective jammer block transmission
source MAC address
secure communication
seamless communication
reliable communication
random address assignment
probability
parameter selection
Ad hoc networks
mobile computing
mobile ad hoc networks
military communication
Jamming
interference suppression
flipped address mechanism
delays
computer network security
Communication system security
cognitive radio
address manipulation
biblio
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:28am
mobile agents
WSN
wireless sensor networks
Wireless Sensor Network
Unified modeling language
telecommunication security
security
research issues
Monitoring
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
MANET
Intrusion Detection Systems
Intrusion Detection
IDS guidelines
IDS
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 2:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
biblio
Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic System
Submitted by BrandonB on Fri, 05/01/2015 - 9:46am
QoS violation
wireless mesh networks
Wireless communication
traffic type
traffic sending rate
traffic regulation scheme
traffic load scale
Throughput
telecommunication traffic
telecommunication congestion control
static routers
regulation process
real-time systems
queuing delays
queueing theory
quality of service
Ad hoc networks
QoS requirements
Protocols
network state
multimedia support
mobile ad hoc networks
mesh routers
Load management
lightly loaded buffers
interval type-2 fuzzy logic system
heavy traffic load
fuzzy control
delays
dedicated QoS protocols
buffer evolution
« first
‹ previous
…
9
10
11
12
13
14
15
16
17