Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET
biblio
Proactive secret sharing for long lived MANETs using Elliptic Curve Cryptography
Submitted by grigby1 on Wed, 06/20/2018 - 11:22am
Ad hoc networks
bi-variate polynomial
Compositionality
Elliptic curve cryptography
MANET
Metrics
mobile ad-hoc network
mobile computing
proactive
Protocols
pubcrawl
resilience
Resiliency
secret sharing technique
security
threshold cryptography
biblio
Neighbor-aware based forwarding strategy in NDN-MANET
Submitted by grigby1 on Mon, 06/11/2018 - 2:37pm
mobility management (mobile radio)
Wireless communication
Scalability
Resiliency
resilience
pubcrawl
performance evaluation
Packet loss
Neighbor-aware based forwarding strategy
neighbor-aware
NDN-MANET
NDN
named data networking
Named Data Network Security
aware forwarding
mobile ad hoc networks
Memory management
MANET
Internet architecture
internet
Human behavior
hop node
greedy forwarding strategy
greedy algorithms
forwarding strategy
delays
data packet response
blind forwarding
biblio
Using Mathematical Methods Against Denial of Service (DoS) Attacks in VANET
Submitted by grigby1 on Thu, 06/07/2018 - 2:03pm
Metrics
VANET
security
Resiliency
resilience
Policy-Governed Secure Collaboration
policy-based governance
Policy
neural networks security
neural network
MANET
mathematical models.
logistic regression
DoS attack
cyber physical systems
collaboration
Attack detection
pubcrawl
attack mitigation
biblio
Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET
Submitted by K_Hooper on Wed, 05/09/2018 - 10:03am
mobile computing
wireless movable nodes
telecommunication security
Security Heuristics
Scalability
Resiliency
pubcrawl
particle swarm optimization
particle swarm optimisation
network simulator
multiple gray hole attack
mobile nodes
Cooperative Gray Hole attack
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
meta heuristic
MANET
malicious node
intermediate nodes
gray hole attack prevention
data packets
biblio
Study of Security in MANETs and Evaluation of Network Performance Using ETX Metric
Submitted by grigby1 on Tue, 05/01/2018 - 10:21am
attacks
ETX metric
MANET
OLSR
pubcrawl
security
Smart Environments
biblio
Study of Security in MANETs and Evaluation of Network Performance Using ETX Metric
Submitted by grigby1 on Mon, 04/30/2018 - 2:08pm
attacks
ETX metric
MANET
Metrics
OLSR
pubcrawl
security
Security Metrics
Smart Environments
biblio
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
quality-of-service constraints
Yices SMT Solver
Trust Routing
SMT-LIB language
SMT-LIB
security
secure routing protocol
Scalability
Routing protocols
Routing Protocol
routing functions
Routing
Resiliency
resilience
requirement models
requirement constraints
Adaptation models
quality of service
QoS constraints
pubcrawl
network topology
mobile nodes
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
MANET
formal verification
formal modelling
composability
adaptive routing protocol
biblio
Improving Trusted Routing by Identifying Malicious Nodes in a MANET Using Reinforcement Learning
Submitted by grigby1 on Wed, 04/11/2018 - 2:02pm
Protocols
vehicular networks
trusted routing
Trust Routing
trust
telecommunication security
self-organizing communication systems
security
Scalability
Routing
Resiliency
resilience
reliable trust improvement
reinforcement learning agent
Reinforcement learning
pubcrawl
ad-hoc on-demand distance vector protocol
Peer-to-peer computing
mobile conferences
mobile ad-hoc networks
mobile ad hoc networks
military operations
MANET
malicious nodes
malicious behaviour
learning (artificial intelligence)
healthcare systems
dynamic wireless connections
dynamic MANET environment
composability
AODV protocol
AODV
biblio
Black hole attack prevention method using dynamic threshold in mobile ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
mobile ad hoc network
telecommunication security
security issues
security attack
Routing protocols
routing information exchange
Routing
Resiliency
pubcrawl
network infrastructure
mobile nodes
mobile ad hoc networks
Ad Hoc Network Security
MANET
malicious node
IP networks
Human Factors
Human behavior
fake routing information
dynamic threshold
data packets
composability
black hole node detection rate
black hole attack prevention method
biblio
Enhancing security for load balanced energy enhanced clustered bee ad hoc network using secret public keys
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
pubcrawl
wireless network
telecommunication security
Security Public Key Cryptography
security
secured PKI scheme
secret public keys
Routing protocols
Routing
resource allocation
Resiliency
public key cryptography
Ad Hoc Network Security
path selection
mobile ad hoc networks
mobile ad hoc network
MANET
load balanced energy enhanced clustered bee ad hoc network
LBEE
Human Factors
Human behavior
Energy Efficiency
composability
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »