Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET
biblio
Cluster based Intrusion Detection System for Mobile Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
mobile ad hoc networks
voting
security of data
Routing protocols
Routing Protocol
route structure
Resiliency
pubcrawl
pattern clustering
node mobility
network traffics
network securities
monitoring process
Monitoring
mobility management (mobile radio)
mobile ad-hoc network
MANET Attack Detection
Metrics
memory overhead
MANET
malicious node
Intrusion Detection
DRINA Intrusion
Compositionality
clustering protocols
cluster based Intrusion detection planning
cluster
CBIDP
ad-hoc node security
Ad Hoc Network Security
active monitoring node
biblio
Performance Analysis of Between Software Defined Wireless Network and Mobile Ad Hoc Network Under DoS Attack
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
SDN structure
network security
Performance analysis
performance criteria
performance values
Resiliency
Routing protocols
SDN
SDN controller
network performance
SDN technology
Software Defined Network
software defined networking
Software Defined wireless Network
traditional network structure
traditional network used today
wireless network technologies
pubcrawl
network interruption
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET structure
MANET routing protocols
MANET
DoS attack
DoS
controller
computer network security
Compositionality
communication technologies
Bandwidth
Ad Hoc Network Security
biblio
Mobile Ad Hoc Network for Security Enhancement
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
MANET
telecommunication security
security enhancement
Secure Hashing Algorithm
Routing protocols
Resiliency
reactive method
Public key
proactive method
private key
mobile ad hoc networks
mobile ad hoc network
Metrics
Message Digest 5
pubcrawl
identification process
hackers node
game theory
game theoretical approach
encryption
decryption processes
Cryptography
Compositionality
AODV
advanced encryption standard
ad hoc on-demand distance vector routing protocol
Ad Hoc Network Security
biblio
A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural Network
Submitted by aekwall on Mon, 08/03/2020 - 10:17am
numerous security challenges
telecommunication security
telecommunication computing
software agents
service providers
service discovery process
service discovery operation
service discovery
security information
security
Routing protocols
quality of service
QoS
pubcrawl
manet privacy
neural nets
mobile ad hoc networks
mobile ad hoc network
MANET
improved security
cross-layer discovery
artificial deep neural network
agent-based cross-layer
agent based secure service discovery scheme
Ad Hoc Network Security
Compositionality
Metrics
Resiliency
biblio
Survey on Fault Tolerance and Security in Mobile Ad Hoc Networks (MANETs)
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
Ad hoc networks
unipath routing
unipath protocols
multipath protocols
MBID
IDS for Mobile Ad hoc Networks
cooperative security
ABID
intrusion tolerance
network topology
Fault tolerant systems
mobile computing
telecommunication security
telecommunication network topology
mobile ad hoc networks
MANET
fault tolerance
Routing protocols
multipath routing
Routing
Protocols
composability
pubcrawl
Resiliency
biblio
Implementation of Lightweight Stream Cipher in AODV Routing Protocol for MANET
Submitted by grigby1 on Mon, 06/01/2020 - 3:59pm
AODV
Blackhole attack
computer science
encryption
HMAC
lightweight stream cipher
MANET
mobile ad hoc networks
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
Trivium
biblio
Comparitive Analysis of Blackhole and Rushing Attack in MANET
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
NS-2 network simulator
wireless networking technology
telecommunication security
Scalability
Rushing attack.
rushing attack
Routing protocols
Resiliency
resilience
pubcrawl
packet delivery ratio
AODV
network layer attack
mobile ad hoc networks
MANETs
MANET
end to end delay
data forwarding operations
centralized network administration
Blackhole attack
Black hole attack
AODV routing protocol
biblio
RAD: Reinforcement Authentication DYMO Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
demand protocol
Secret key
Compositionality
Encryption technique
mobility management (mobile radio)
malicious node
MANET security
authentication technique
average throughput
cryptographic operations
mobile ad hoc network
DYMO
dynamic MANET
infrastructure centralized server
MD5
Message Digest 5
RAD
reinforcement authentication DYMO protocol
Reinforcement.
Routing protocols
telecommunication security
Cryptographic Protocols
learning (artificial intelligence)
Resiliency
pubcrawl
Routing
Metrics
Reinforcement learning
authentication
encryption
message authentication
packet delivery ratio
telecommunication computing
delays
MANET
mobile ad hoc networks
Throughput
end to end delay
biblio
Performance Analysis of OLSR Protocol under MPR Attack in Progressive Size Grid MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
1-hop neighbor nodes
topological information
progressive size grid MANET
proactive routing protocol
predefined infrastructures
OLSR protocol
OLSR
MPR attack
mobile ad hoc network
low level applications
hello messages
grid MANET
efficient OLSR attacks
effective routing protocol
control messages
central administration
security
Performance analysis
MANET security
battery life
relay networks (telecommunication)
Compositionality
mobile devices
telecommunication network topology
mobile ad-hoc network
mobile ad hoc networks
MANET
Metrics
Routing protocols
pubcrawl
Resiliency
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
cheat nodes
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
artificial immune systems
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
Immune system
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
security of data
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »