Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET
biblio
Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric
Submitted by grigby1 on Mon, 03/09/2020 - 2:39pm
mobile ad hoc network
telecommunication security
telecommunication network reliability
Security Metrics
security
Routing protocols
Routing
Resiliency
reliability metric
Reliability engineering
ns-2.35 simulation software
network reliability
network nodes
mobile ad-hoc network
mobile ad hoc networks
pubcrawl
Metrics
Measurement
MANET
gray hole node
gray hole attack analysis
Gray hole attack
Compositionality
common security attacks
AODV routing protocol
AODV
ad hoc on demand distance vector routing protocol
Ad Hoc Network Security
active research work
biblio
Analytical Study on Mobile Ad Hoc Networks for IPV6
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
Mobile impromptu systems
wireless gadget connections
Wireless communication
transport protocols
telecommunication traffic
Technological innovation
TCP-IP
steering conventions
self arranging system
Resiliency
resilience
pubcrawl
protocol
policy-based governance
pervasive computing
Base stations
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
IPV6 systems
ipv6 security
IPv6 MANET
IPv4 MANET
IP networks
Handheld computers
computer network security
composability
Communication system security
collaboration
biblio
AIS Reputation Mechanism in MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:57am
security
Pathogens
pubcrawl
real-time trust computations
reputation
resilience
Resiliency
resilient reputation mechanism
Routing
PAMP
security of data
self-organizing network
selfish
telecommunication network topology
telecommunication security
trust
trust state
trust values
Immune system
network topology
neighbor nodes
mobile ad hoc networks
Metrics
MANET trust frameworks
MANET security
MANET nodes
MANET
nodes act
flexible networking capability
dynamic topology
Danger Signal
Computational modeling
Compositionality
Artificial Intelligence
AIS reputation mechanism
AIS
biblio
Secure Routing for MANET Connected Internet of Things Systems
Submitted by grigby1 on Mon, 09/09/2019 - 10:57am
Resiliency
trusted device
telecommunication security
standardized routing protocol for low-power and lossy networks
sensor network
security threats
security enhanced routing protocols
security
Secure Routing
RPL
Routing protocols
Routing
Compositionality
resilience
pubcrawl
network security
mobile ad hoc networks
Metrics
MANET-IoT connectivity
MANET-connected Internet-of-Things systems
MANET security
MANET
IoT
Internet of Things
biblio
An Enhanced Threshold Based Cryptography with Secrete Sharing and Particle Swarm Optimization for Data Sending in MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:57am
NPSOM technique
wireless network
telecommunication security
steady particle swarm optimizer technique
Servers
security
secrete sharing method
secrete sharing
Resiliency
resilience
receiving process
pubcrawl
particle swarm optimization (PSO)
particle swarm optimization
particle swarm optimisation
optimization
Birds
new particle swarm optimization method
Monitoring
mobility management (mobile radio)
mobility features
mobile ad hoc networks
Metrics
MANET security
MANET network
MANET
Fish
enhanced threshold based cryptography
dynamic network topology
data sending process
Cryptography
Compositionality
biblio
Trust Based Certificate Revocation and Attacks in MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Metrics
vector-based trust mechanism
telecommunication security
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile computing
mobile ad-hoc network security
mobile ad hoc networks
Ad hoc networks
MANET security
MANET
enhanced certificate revocation scheme
data packets
Conferences
Compositionality
clustering
Certificate Revocation
blackhole attacker
attacks
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
biblio
Trust-Based Performance Evaluation of Routing Protocol Design with Security and QoS over MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
policy-based network administration
usability
trust-based performance evaluation
telecommunication security
Routing protocols
routing protocol design
Resiliency
resilience
quality of service (QoS)
quality of service
QoS
pubcrawl
psychology
Pragmatics
ART
Mobile handsets
mobile circumstantial network
mobile ad hoc networks
Metrics
MANET security
MANET
Loading
Learning management systems
key administration
IPsec
Internet Protocol Security (IPsec)
Cryptographic Protocols
Compositionality
biblio
Hybrid Approach for Congestion Control in VANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Compositionality
Congestion Control
MANET
MANET security
Metrics
pubcrawl
quality of service
resilience
Resiliency
Safety messages
VANETs
biblio
Optimizing Performance of Anonymity Based Secure Routing Protocol Utilizing Cross Layer Design for Mobile Adhoc Networks
Submitted by grigby1 on Mon, 08/26/2019 - 11:09am
power control
telecommunication security
telecommunication network topology
telecommunication control
SHORT
secure cross layer routing protocol
secure cross layer based power control protocol
SCLPC protocol
SCLPC
Routing protocols
Routing
Resiliency
resilience
pubcrawl
anonymity based Secure routing protocol
optimizing route technique
Mobile adhoc Network
mobile ad hoc networks
MANET
delays
Cryptography
Cross Layer Security
Cross layer designs
Cross layer design
cross layer based designs
composability
anonymous secure routing
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »