Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET
biblio
Distributed Trust-Based Multiple Attack Prevention for Secure MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:19am
Ad hoc networks
composability
cyber physical systems
Data models
distributed trust
Intrusion Detection
MANET
manet attack prevention
Metrics
mobile computing
Multiple Attacks
network security
Probes
Receivers
Resiliency
Steady-state
biblio
Prevention of Timing Attack in Software Defined Named Data Network with VANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
telecommunication network topology
pubcrawl
Resiliency
Safety
Scalability
SDN
Software
Software Defined Network
software defined networking
Software Defined Networks
TAP protocol
Protocols
timing
Timing Attack Prevention protocol
V2I communication
V2V communication
VANET
vehicle to infrastructure communication
vehicle-to-vehicle communication
vehicular
vehicular ad hoc networks
Vehicular Ad-hoc Network
IPv4 addressing problems
attacker vehicles
composability
computer network security
content
data network
Human behavior
Interest
internet
Internet technique
IP networks
attack
MANET
MANET Attack Mitigation
Metrics
mobile computing
named data networking
named data networks
Named Data Network Security
NDN techniques
Peer-to-peer computing
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
Mitigating wormhole attack in MANET using absolute deviation statistical approach
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
MANET Attack Mitigation
wormhole attack mitigation
wormhole attack
Throughput
telecommunication security
telecommunication network routing
Resiliency
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
Metrics
MATLAB simulator
absolute deviation
MANET
fake tunnel
covariance
correlation methods
correlation coefficient
Correlation
composability
Color
AD correlation
absolute deviation statistical approach
absolute deviation correlation coefficient
biblio
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
Ad hoc networks
composability
Data models
IDS
MANET
MANET Attack Detection
Metrics
mobile computing
pubcrawl
Resiliency
Route cache
Routing
Routing protocols
Support vector machines
SVM
biblio
Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
mobile computing
Wormhole tunnel
wormhole attack detection
wireless medium
Wireless communication
telecommunication security
telecommunication network routing
Routing
Resiliency
pubcrawl
network level
Communication system security
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
graph theory
Extremities
end-nodes
composability
biblio
Watchdog and Pathrater based Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing table
open nodes
pathrater
pathrater method
Peer-to-peer computing
pubcrawl
Resiliency
Routing
Routing protocols
network topology
security
security of data
Sinkhole attack
telecommunication security
unwanted malicious attacks
Watchdog
watchdog method
Ad-hoc On-demand Distance Vector
mobile radio
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
fake route
effective intrusion detection system
dynamic source routing
computer network security
composability
broad distribution
AODV routing protocol
biblio
ReverseRoute: An Application-Layer Scheme for Detecting Blackholes in MANET Using Mobile Agents
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobility speeds
Throughput
telecommunication security
single nodes
simple application layer based intrusion detection scheme
security attacks
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
multiple blackhole nodes
application-layer scheme
mobile agents
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
lower layers
Intrusion Detection
effective application layer based intrusion detection scheme
detection mechanism
composability
Blackhole attack
biblio
Reputation and trust based selfish node detection system in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobile ad hoc network
trust based selfish node detection system
telecommunication network routing
selfish
Routing protocols
routing layer
Routing
Resiliency
pubcrawl
packet forwarding
node authentication
node
network channel jamming
mobile ad hoc networks
Base stations
misbehavior
Metrics
Measurement
MANETs
MANET Attack Detection
MANET
Load modeling
detection
control systems
Conferences
composability
cellular telephones
biblio
A New Statistical Method for Wormhole Attack Detection in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
number of new neighbors
wormhole attack detection
wormhole attack
wireless sensor networks
Training
telecommunication security
SWAN
statistical methods
security attacks
Routing protocols
Resiliency
pubcrawl
Ad hoc networks
number of neighbors
NS3 simulator
mobile wireless nodes
mobile computing
mobile ad hoc networks
microsoft windows
Metrics
MANET Attack Detection
MANET
delays
composability
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »