Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
packet delivery ratio
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
biblio
Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
mobile ad-hoc network
trust relationship
Throughput
telecommunication security
telecommunication network routing
single malicious node
Routing protocols
routing attacks
Routing
Resiliency
pubcrawl
packet delivery ratio
notice participation
black hole
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
Intrusion Detection
IDS
gray hole
defense mechanism
data packets
composability
biblio
Trust-aware routing protocol for mobile crowdsensing environments
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
sensor lifetime
MCS
Measurement
mobile crowdsensing environments
multi-metric decision
network lifetime
optimal routing decision
packet delivery ratio
residual energy
link quality node selection
Signal to noise ratio
sink node
social behaviour
suboptimal data forwarding
Trust management
trust-aware routing protocol
Trust Routing
Scalability
link quality
Fuzzy logic
friendship mechanism
FR solution
Energy Efficiency
telecommunication power management
Routing
energy conservation
wireless sensor networks
Routing protocols
composability
pubcrawl
Resiliency
mobile computing
Conferences
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol
biblio
Improving existing 6LoWPAN RPL for content based routing
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
Reliability
low-power wireless personal area network
operating systems
operating systems (computers)
packet delivery ratio
personal area networks
power consumption
Power demand
pubcrawl
Linear programming
Resiliency
Routing
routing protocol for low power and lossy network
Routing protocols
sensor networks
telecommunication traffic
Traffic congestion
cooja
6LoWPAN RPL
CBR technique
composability
computer network reliability
Conferences
content based routing
content based routing technique
contiki operating system
6LoWPAN
cooja simulator.
data aggregation
data aggregation ratio
energy consumption
Energy Efficiency
home automation
Internet of Things
biblio
Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
school campus networks
packet transmission
participating nodes
Peer-to-peer computing
pubcrawl
resilience
Routing
routing nodes
Routing Protocol
Routing protocols
packet delivery ratio
service coverage
telecommunication security
transmitted data packets
ubiquitous wireless networks
wireless mesh network
wireless mesh networks
wireless sensor networks
WMNs
influential factors
AODV
black hole
Black hole attack
community networking
composability
emergency rescue operations
home automation
IEEE 802.11 Standard
Ad hoc networks
Malicious Packet Drop
malicious packet drop attack
Metrics
multihop destination
network maintenance
network performance reliability
NS-3 simulator
office automation
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
biblio
Security in Wireless Sensor Networks: Key Management Module in EECBKM
Submitted by BrandonB on Wed, 05/06/2015 - 1:41pm
packet delivery ratio
WSN communication
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network management
security information
Secuirty
Routing protocols
Routing
authentication
node capture attack
Nickel
limited memory resource
key management module
key management
energy consumption
energy constraint
EECBKM
Cryptography
biblio
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Observers
uncertainty handling
uncertain reasoning
trust management scheme
Trust management
telecommunication security
telecommunication network topology
telecommunication computing
security vulnerabilities
security enhancements
security
Routing
planning (artificial intelligence)
PDR improvement
packet delivery ratio
open wireless medium
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
MANET
indirect observation
end-to-end delay
dynamic topology
DST method
direct observation
Dempster-Shafer Theory
cognition
Bayesian inference
Bayes methods
artificial intelligence community
biblio
Mitigating Flooding Attacks on Mobility in Infrastructure-Based Vehicular Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:51am
mobility management
WMN
wireless mesh networks
vehicular networks
telecommunication security
technological convergence
security
secure mobility scheme
packet delivery ratio
network access
negative effects
Monitoring
mobility management (mobile radio)
ARP packets flooding
Mobility
Mobile radio mobility management
MIRF
malicious ARP requests
IP networks
internet
infrastructure-based vehicular networks
handoffs
Floods
flooding attacks mitigation
Flooding Attacks
Filtering
« first
‹ previous
1
2