Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
biblio
Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
mobile ad-hoc network
trust relationship
Throughput
telecommunication security
telecommunication network routing
single malicious node
Routing protocols
routing attacks
Routing
Resiliency
pubcrawl
packet delivery ratio
notice participation
black hole
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
Intrusion Detection
IDS
gray hole
defense mechanism
data packets
composability
biblio
SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
MANET security
SYN flood attack
Servers
Routing
Resiliency
pubcrawl
probability
Monitoring
mobile ad hoc networks
Metrics
Artificial Intelligence
MANET Attack Detection
MANET
Floods
Firewalls (computing)
Compositionality
composability
Clustering algorithms
Bay Estimator
biblio
Game Theoretical Approach with Audit Based Misbehavior Detection System
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
mobile ad-hoc networks
dynamically shifting nodes
end-to-end encrypted traffic
GAMD
game theoretical approach
incentive based reputation scheme
incentive schemes
MANET environment
misbehaving nodes
misbehavior nodes
continuous packet droppers
multichannel networks
multihop ad hoc networks
node behavior
per-packet basis
selective dropping attacks
selective packet droppers
Selfish node
supervisory game
theoretical cryptography
Routing protocols
Monitoring
pubcrawl
composability
Conferences
game theory
Ad hoc networks
telecommunication security
Peer-to-peer computing
Routing
Games
Cryptography
Compositionality
MANET
mobile ad hoc networks
mobile nodes
AMD
Audit based Misbehavior Detection system
Audit-based Misbehavior Detection
biblio
Detection of malicious node in mobile ad-hoc network
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
mobile ad hoc networks
wireless links
Wireless communication
telecommunication network routing
selective acknowledgment
security
Routing protocols
routing overhead
Routing
Resiliency
pubcrawl
NS2 simulation
network security
network packet delivery ratio
mobile nodes
Ad Hoc Network Security
mobile ad hoc network
Metrics
MANET
malicious node detection
malicious node
intrusion detection mechanisms
firewalls software
firewalls
encryption software
Cryptography
Compositionality
Communication system security
AODV
adaptive acknowledgment
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol
biblio
Distributed adaptive beam nulling to mitigate jamming in 3D UAV mesh networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
optimisation
jamming mitigation
Kalman filter
Kalman filter based tracking mechanism
Kalman filters
MANET
Mesh networks
Metrics
mobile jammer
motion measurement
next generation mission critical wireless networks
jamming attack avoidance
optimization goal
pubcrawl
resilience
Resiliency
spectral utilization
tracking
Unmanned Aerial Vehicles
VANET
wireless mesh networks
beam null border
3D spatial filtering
3D spatial reuse
3D UAV mesh networks
3D wireless mesh networks
adaptive beam nulling
aircraft communication
antennas
attack mitigation
autonomous aerial vehicles
3D mesh
Compositionality
directional antenna
disruptive attacks
distributed adaptive beam nulling
distributed mechanism
Extraterrestrial measurements
Interference
interference suppression
Jamming
biblio
Attacks and mitigation techniques on mobile ad hoc network \#x2014; A survey
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
mobile ad hoc networking
ubiquitous computing
telecommunication network routing
Sybil attack
routing table
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
attack mitigation
mobile ad hoc network
mitigation techniques
military search operations
military rescue operations
Metrics
Market research
MANET
Compositionality
civilian environment
attacks techniques
attacks in manet
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
Resiliency
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
mobile ad hoc networks
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field
AODV
Metrics
MANET
IDS
high destination sequence number
destination nodes
delays
data packets
cross checking
Conferences
Compositionality
clustering
byzantine attacks
Blackhole
black-hole attack mitigation techniques
attack mitigation
biblio
STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
Metrics
trust level
telecommunication security
STAODV
service attack
security
secure trust based approach
Routing protocols
Routing
Resiliency
resilience
pubcrawl
participating node
network layer
network architecture
mobile ad hoc networks
adjacent nodes
MANET security
MANET force
MANET
malicious node
Conferences
Computational modeling
Compositionality
blackhole attack mitigation
Blackhole attack
Base stations
autonomous nodes
attack mitigation
AODV routing protocol
AODV based MANET
AODV
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »