Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET
biblio
Solutions to Black Hole Attacks in MANETs
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
mobile computing
ZRP
self-organising networks
original routing protocol
numerous routing protocols
importance each day
black hole attack solutions
Black hole attacks
OLSR
Dsr
AODV
black holes
Black hole attack
Energy Efficiency
security
Ad hoc networks
Throughput
mobile ad hoc networks
MANET
testing
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
Scalability
RPL
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 1:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
An adaptive approach for Detecting Blackhole using TCP Analysis in MANETs
Submitted by grigby1 on Mon, 12/28/2020 - 1:03pm
security
mobile radio
multipath
ns2
popular attack
pubcrawl
recent few years
reliable transport layer protocol TCP
resilience
Routing protocols
mobile ad-hoc network
self-configuring
society amd researchers
TCP
TCP analysis
telecommunication network reliability
telecommunication security
transport protocols
unstructured networks
Blackhole attack
Resiliency
Metrics
Compositionality
ad hoc network
Ad hoc networks
adaptive approach
Adhoc network
AODV
manet privacy
central controlling authority
different circumstance
dynamic absence
information security
infra less environment
MANET
MANETs
mobile ad hoc networks
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
biblio
An Energy Efficient Security Aware Clustering approach using Fuzzy Logic for Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 1:00pm
MANET
telecommunication security
telecommunication power management
SFLC
security-aware fuzzy-based clustering
security
resilience
pubcrawl
pattern clustering
network topology
mobile adhoc networks
mobile ad hoc networks
manet privacy
Fuzzy logic
energy efficient security aware clustering approach
energy conservation
Energy
computation time
clustering
cluster head selection
ad hoc network
Compositionality
Metrics
Resiliency
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by grigby1 on Tue, 11/17/2020 - 2:51pm
probability
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
Mean-field game
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
Human Factors
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
actor-critic-mass algorithm
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
biblio
A Neighbor Trust-Based Mechanism to Protect Mobile Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:42pm
malicious attacks
manet privacy
temporal link
neighbor trust-based security scheme
neighbor trust-based mechanism
mobile network protection
Mobie ad hoc networks
malicious function
mobile nodes
Trust management
telecommunication security
Compositionality
Mobile communication
mobile ad hoc network
mobile ad hoc networks
MANET
Metrics
privacy
pubcrawl
Resiliency
biblio
MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
emergency response networks
Compositionality
Network
emergency management
emergency services
building mobile device trust
building resiliency
communication utility patterns
crowd sensing
Buildings
MACH 2K
MACH-2K trust overlay network architecture
message confidentiality
Mobile handsets
private mobile devices
public service networks
vpn
manet privacy
pubcrawl
architecture
Cryptography
data privacy
Organizations
telecommunication security
History
computer architecture
Resiliency
security
overlay networks
Peer-to-peer computing
Metrics
trust
Ad hoc networks
MANET
mobile ad hoc networks
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »