Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ns2
biblio
Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)
Submitted by aekwall on Tue, 03/09/2021 - 12:36pm
Packet loss
ns2
normal network conditions
largest remaining energy
flooding attack AODV routing protocol
Flooding Attack
energy-efficient AODV
energy parameters
different network conditions
Black hole attacks
Vehicular Ad-hoc Network
Performance analysis
wireless technology
Black hole attack
Energy
AODV
Scalability
data communication
Blackhole attack
Throughput
VANET
quality of service
delays
Energy Efficiency
Wireless communication
vehicular ad hoc networks
malicious nodes
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
An adaptive approach for Detecting Blackhole using TCP Analysis in MANETs
Submitted by grigby1 on Mon, 12/28/2020 - 1:03pm
security
mobile radio
multipath
ns2
popular attack
pubcrawl
recent few years
reliable transport layer protocol TCP
resilience
Routing protocols
mobile ad-hoc network
self-configuring
society amd researchers
TCP
TCP analysis
telecommunication network reliability
telecommunication security
transport protocols
unstructured networks
Blackhole attack
Resiliency
Metrics
Compositionality
ad hoc network
Ad hoc networks
adaptive approach
Adhoc network
AODV
manet privacy
central controlling authority
different circumstance
dynamic absence
information security
infra less environment
MANET
MANETs
mobile ad hoc networks
biblio
Detection Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
Cognitive radio (CR) network
Cognitive Radio Security
yardstick based threshold allocation technique
Yardstick based Threshold Allocation (YTA)
X-graph
unlicensed secondary users
spectrum sensing
spectrum scarcity problem
spectrum access probability
Secondary User (SUs)
Primary User Emulation Attack (PUEA)
Primary User (PU)
ns2
free spectrum
dynamic cognitive radio networks
pubcrawl
radiofrequency interference
primary user emulation attack
emulation
licensed primary user
radio spectrum management
cognitive radio
STEM
resource management
sensors
estimation
Analytical models
telecommunication security
Resiliency
resilience
biblio
A Global Approach for the Improvement of UHF RFID Safety and Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
Safety
UHF RFID tags
UHF RFID security improvement
UHF RFID safety improvement
UHF RFID
UHF devices
telecommunication network reliability
system robustness evaluation
system behavior simulation
supply chain security
security
secure tag hardware architectures
secure protocols
Scalability
authentication
Robustness
RFID privacy
Resiliency
resilience
radiofrequency identification
pubcrawl
Protocols
ns2
Human behavior
Hardware
fpga prototyping
Cryptographic Protocols
Authentication Protocols
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity