Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc networks
biblio
Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
mobile computing
Wormhole tunnel
wormhole attack detection
wireless medium
Wireless communication
telecommunication security
telecommunication network routing
Routing
Resiliency
pubcrawl
network level
Communication system security
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
graph theory
Extremities
end-nodes
composability
biblio
A Multi-layered Outlier Detection Model for Resource Constraint Hierarchical MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
MANET Attack Detection
security dimensions
resource constraint hierarchical MANET
Resiliency
quality-of-service parameters
quality of service
QoS
pubcrawl
Outliers
outlier minimum improvements
novel multilayered outlier detection algorithm
network performance
multilayered outlier detection model
mobile ad hoc networks
Metrics
ad hoc communication MANET
layered architecture
inliers
high security level
hierarchical similarity metric
hierarchical categorized data
fixed infrastructure
Dynamic Network
distributed network
density-based clustering
decentralized network
Data collection
data analysis
composability
Attack detection
biblio
Watchdog and Pathrater based Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing table
open nodes
pathrater
pathrater method
Peer-to-peer computing
pubcrawl
Resiliency
Routing
Routing protocols
network topology
security
security of data
Sinkhole attack
telecommunication security
unwanted malicious attacks
Watchdog
watchdog method
Ad-hoc On-demand Distance Vector
mobile radio
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
fake route
effective intrusion detection system
dynamic source routing
computer network security
composability
broad distribution
AODV routing protocol
biblio
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing procedure
multiple malicious nodes
passive attacks
privacy
pubcrawl
reasoning rules
Resiliency
Routing
routing phases
mobile computing
routing security
security
Syslog
telecommunication network routing
telecommunication security
verification
verification phase
active attacks
mobile ad hoc networks
Metrics
Merkle hash tree
MANETs routing
MANETs
MANET Attack Detection
log-based anomalies detection
flow graphs
flow graph
Diagnostics
composability
cognition
central control program
Anomaly Detection
Ad hoc networks
biblio
ReverseRoute: An Application-Layer Scheme for Detecting Blackholes in MANET Using Mobile Agents
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobility speeds
Throughput
telecommunication security
single nodes
simple application layer based intrusion detection scheme
security attacks
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
multiple blackhole nodes
application-layer scheme
mobile agents
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
lower layers
Intrusion Detection
effective application layer based intrusion detection scheme
detection mechanism
composability
Blackhole attack
biblio
Reputation and trust based selfish node detection system in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobile ad hoc network
trust based selfish node detection system
telecommunication network routing
selfish
Routing protocols
routing layer
Routing
Resiliency
pubcrawl
packet forwarding
node authentication
node
network channel jamming
mobile ad hoc networks
Base stations
misbehavior
Metrics
Measurement
MANETs
MANET Attack Detection
MANET
Load modeling
detection
control systems
Conferences
composability
cellular telephones
biblio
A New Statistical Method for Wormhole Attack Detection in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
number of new neighbors
wormhole attack detection
wormhole attack
wireless sensor networks
Training
telecommunication security
SWAN
statistical methods
security attacks
Routing protocols
Resiliency
pubcrawl
Ad hoc networks
number of neighbors
NS3 simulator
mobile wireless nodes
mobile computing
mobile ad hoc networks
microsoft windows
Metrics
MANET Attack Detection
MANET
delays
composability
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
biblio
Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
mobile ad-hoc network
trust relationship
Throughput
telecommunication security
telecommunication network routing
single malicious node
Routing protocols
routing attacks
Routing
Resiliency
pubcrawl
packet delivery ratio
notice participation
black hole
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
Intrusion Detection
IDS
gray hole
defense mechanism
data packets
composability
biblio
SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
MANET security
SYN flood attack
Servers
Routing
Resiliency
pubcrawl
probability
Monitoring
mobile ad hoc networks
Metrics
Artificial Intelligence
MANET Attack Detection
MANET
Floods
Firewalls (computing)
Compositionality
composability
Clustering algorithms
Bay Estimator
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »