Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
Multi-path Routing Protocol in the Smart Digital Environment
Submitted by grigby1 on Wed, 06/20/2018 - 12:24pm
security
Compositionality
pubcrawl
Resiliency
resilience
Metrics
MANET
EA-MPR
ETX
FLC
MBA-OLSR
MCNR
MP-OLSR
WRR
biblio
Performance Analysis of Black Hole Attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
MANET
Attack detection
AODV
black hole
Compositionality
Metrics
NS-2
pub-crawl
pubcrawl
resilience
Resiliency
security
simulation
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
Elimination of internal attacksfor PUMA in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
multicast protocols
telecommunication security
single sender node
security
Routing protocols
Routing
Resiliency
resilience
receiver nodes
PUMA
pubcrawl
Protocol for Unified Multicasting through Announcements
network resources
multicast routing protocol
communication costs
multicast communication
multicast announcement packet fabrication attack
multicast activity-based overhearing technique
mobile ad hoc networks
Metrics
MANET
MA FabricationAttack
Key exchange
internal attacks
Group communication
fabrication
Conferences
Compositionality
biblio
Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Routing protocols
nods defection
open wireless medium
packet drop rate
packet dropping attack
packet forwarding
pubcrawl
reactive routing protocols
resilience
Resiliency
Routing
nodes unreliability
routing rules
security
self-configuring automatic vehicles
selfish behaviours
Selfish nodes
T-MANET
Tactical MANET
Tactical Mobile Ad-hoc NETworks
telecommunication security
Wireless communication
MANET
attack model
black hole
Compositionality
DSR routing protocol
energy consumption rate
gray hole
high dynamic network architecture
insider threat model
Insider Threats
malicious insider threats
Ad-Hoc Network
Measurement
Metrics
mobile ad hoc network
mobile ad hoc networks
network flow
Network Simulator 2
network throughput
nodes cooperation
nodes misbehavior
biblio
A new anti-jamming reliable routing protocol for tactical MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Routing protocols
neighboring node
node mobility
pubcrawl
Reliability
resilience
Resiliency
Routing
Routing Protocol
neighbor dependency
security
tactical communications
Tactical MANET
Tactical MANETs
telecommunication network reliability
telecommunication security
Wireless communication
Anti-jamming
mobile ad hoc networks
military communication
Metrics
Measurement
MANET
malicious jamming attacks
link stability evaluation
jamming interference
Jamming
Interference
exponential smoothing estimation
data transmission reliability
Compositionality
channel state information
anti-jamming reliable routing protocol
biblio
Intrusion detection systems in MANETs using hybrid techniques
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
RSA algorithm
mobile ad hoc networks
pubcrawl
public key cryptography
resilience
Resiliency
Routing
Routing protocols
RSA
Metrics
security
security of data
self organized wireless technologies
SHA 256 hashing technique
telecommunication security
ZRP
ZRP routing protocol
AES
MANET
intrusion detection system technique
Intrusion Detection
IDS technique
hybrid cryptographic technique
enhanced adaptive acknowledgement
EAACK
data authentication
Cryptography
Cryptographic Protocols
Compositionality
base station
AODV routing protocol
AODV
AES algorithm
biblio
A generic request/reply based algorithm for detection of blackhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Mobile Ad Hoc Network technology
Vulnerability
telecommunication security
Technological innovation
security
RREP packet
Routing protocols
Robustness
Resiliency
resilience
RERR packet
pubcrawl
Monitoring
mobile ad hoc networks
Attack detection
Metrics
MANET nodes
MANET
malicious node
legitimate node
IP networks
generic request/reply
Compositionality
communication policy
collaboration
Blackhole attack
attacks
attackers
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »