Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET
biblio
Gray hole attack detection in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MD6 security algorithm
Message Digest 5
Metrics
mobile ad hoc networks
mobile ad-hoc network
Mobile communication
mobile computing
networking system
MD5 algorithm
resilience
Resiliency
routing overhead
Routing protocols
self-stabilizing election algorithm
telecommunication network routing
telecommunication security
voting
dynamic cluster head selection
Ad-hoc on demand distance vector protocol
AES security algorithm
Attack detection
batteries
battery power
Clustering algorithms
Compositionality
data transmission rate
Ad hoc networks
dynamic nodes
Election Algorithm
gray hole attack detection
gray hole nodes
identical broadcast range
intrusion detection system
intrusion revealing system
MANET
biblio
Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
resilience
Organizations
packet drop
Peer-to-peer computing
Protocols
pubcrawl
Quality metrics
Re-Routing
rejoining processing
Reliable Path
mobile computing
Resiliency
root nodes
Routing
Routing Protocol
Routing protocols
telecommunication channels
telecommunication network management
telecommunication security
wireless infrastructureless network
GroupKeyManagement
ad hoc environment
Ad hoc networks
Attack detection
authorized nodes
Compositionality
delays
dropped packets
EGSR schemes
group capacity
2ACK scheme
Hybrid based PSO
information transmission
internal attacks
MANET
MANETs
Metrics
mobile ad hoc network
mobile ad hoc networks
biblio
Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
mobile ad hoc environment
telecommunication security
security methods
security
Secure Routing
Routing protocols
Resiliency
resilience
pubcrawl
outlier detection
network simulator tool
mobile ad hoc networks
ad hoc-on-demand distance vector reactive routing protocol
Metrics
MANET
efficient outlier detection scheme based security algorithm
Conferences
Compositionality
Black hole attack
Attack detection
AODV routing protocol
AODV
Anomaly Detection
Algorithm design and analysis
biblio
Flooding attack detection and prevention in MANET based on cross layer link quality assessment
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
link layer assessment based flooding attack detection
Topology
telecommunication security
telecommunication network routing
routing table
Routing
Resiliency
resilience
pubcrawl
network topology
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
accurate flooding attack detection
flooding node detection
Flooding Attack
Distributed Denial of Services attack
DDoS Attack
DDoS
cross layer MAC-Network interface
cross layer link quality assessment
Cross layer design
Cross Layer
Computer crime
Compositionality
Attack detection
biblio
SAODV: Black hole and gray hole attack detection protocol in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:30pm
secure AODV protocol
open nature
Peer-to-peer computing
Protocols
pubcrawl
radio links
resilience
Resiliency
SAODV
mobile nature
security attacks
security problem
standards
telecommunication security
Throughput
wireless links
wireless mobile nodes
Ad hoc networks
mobile computing
mobile ad hoc networks
Metrics
MANET
malicious node
gray hole attacks
gray hole attack detection protocol
Gray hole attack
forwarding packets
delays
Cryptographic Protocols
Compositionality
Black hole attack
Attack detection
AODV
biblio
Secure and concealment in cluster based framework on vehicular networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:28pm
Roads
wireless sensor networks
Wireless Sensor Network
vehicular networks
Vehicular Communication
vehicular ad hoc networks
vehicular ad hoc network (VANET)
vehicular ad hoc network
VANET networks
telecommunication security
sensor nodes
Selfish node
security and privacy
security
secure concealment
Cloud Computing
Resiliency
resilience
pubcrawl
privacy
Metrics
MANET
lightweight cloud environment
Incentive scheme
embedded systems
Delay tolerant network (DTN)
Conferences
Compositionality
cluster based framework
biblio
Mobile powered sub-group detection/formation using taste-based collaborative filtering technique
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
pubcrawl
wikipedia discussions
unsupervised approach
Taste-based Similarity MANET
taste-based group
taste-based collaborative filtering technique
sub-group detection performance
Social networking sites
social networking (online)
Social network services
Social Mediadata
social media discussion data
sensors
Resiliency
resilience
Collabarative Filtering
privacy
p2p
Mobile powered sub-group detection/formation
mobile computing
Mobile communication
Metrics
MANET
implicit attitude
Global Positioning System
explicit attitude
debate discussion forum
computer science
Compositionality
collaborative filtering
biblio
A review on VANET security attacks and their countermeasure
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
Resiliency
world VANET
Wireless communication
vehicular ad hoc networks
VANETs wireless communication
VANETs architecture
VANETs
VANET technology
VANET security attacks
V2Vcommunication
telecommunication security
smart cities
security issues
security
Roads
attacks
resilience
pubcrawl
privacy properties
privacy
mobile computing
Metrics
MANETs
MANET
infrastructure communication
ECDSA
DSRC
Cryptography
Compositionality
authentication
biblio
Group signature based privacy protection algorithm for mobile ad hoc network
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
vehicular ad hoc networks
vehicular ad hoc network
Time delay
signature length
short group signature
Resiliency
resilience
pubcrawl
privacy protection issues
privacy protection
privacy
Packet loss rate
network model
anonymous verification
mobile ad hoc network
Metrics
message verification
MANET
group signature based privacy protection algorithm
digital signatures
Data protection
Compositionality
BBS algorithm
Batch verification
automobiles
authentication
biblio
Impact of unreliable positioning in location-based routing protocols for MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
unreliable positioning
tools
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
quality of service
pubcrawl
privacy
positioning error
node scalability
network overhead
network lifetime
Ad hoc networks
mobile ad hoc networks
Metrics
MANET
location-based routing protocols
Energy Efficiency
effective routing
DYMOselfwd
DYMO
Data Security
data privacy
Compositionality
AODV-Line
AODV
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »