Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET
biblio
A secure reputation based architecture for MANET routing
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
Routing
Node identity
Prime Product Number
pubcrawl
Reliability
reputation level table
Reputation Value
resilience
Resiliency
Monitoring
Routing misbehavior
Routing protocols
secure reputation based architecture
secure routing protocol
specific prime number
telecommunication security
Wireless ad hoc network
Worm hole attacks
legitimacy value table
backbone network
civilian domains
Compositionality
Cryptography
denial of service
Denial of Service attacks
DoS attacks
grid structure
attack mitigation
malicious node effect mitigation
MANET
MANET routing
Metrics
military domains
mobile ad hoc network
mobile ad hoc networks
biblio
Mitigating techniques of black hole attack in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 11:41am
Metrics
wireless connections
Wireless communication
telecommunication security
telecommunication network topology
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
mobile ad-hoc network
mobile ad hoc networks
Ad-hoc On-demand Distance Vector
Market research
MANET
infrastructure-less network
dynamic topology
detection and prevention
Compositionality
black hole node
Black hole attack
attack mitigation
AODV routing protocol
AODV protocol
biblio
Quality of Service Oriented Secure Routing Model for Mobile Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
attack prevention
Compositionality
MANET
Metrics
pubcrawl
QoS
resilience
Resiliency
System Level
biblio
Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
Resiliency
wormhole attacks
wormhole attack
telecommunication security
sinkhole node
sinkhole attacks
Sinkhole attack
security attacks
security
secure attack aware routing
Routing protocols
Routing
AODV
resilience
pubcrawl
mobile nodes
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
Compositionality
attack prevention
Attack Aware Alert
biblio
Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
mobile ad hoc networks
WSN
wireless sensor networks
virtual node
telecommunication security
selective flooding technique
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Optimized Link State Routing protocol
OLSR protocol
OLSR
network layer attacks
attack prevention
Metrics
MANET routing protocol
MANET
formal routing
Fictitious Node Mechanism
Elliptic curve cryptography
ECC algorithm
DoS attacks
DoS
denial of service attack
Denial Contradictions
DCFM
Compositionality
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
Jellyfish attack detection and prevention in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:38am
JF reorder attack
telecommunication security
signal processing
sensors
security
Resiliency
resilience
pubcrawl
Protocols
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
attack prevention
JF periodic dropping attack
JF delay variance attack
JF attack delay data packets
Jellyfish Delay Variance Attack (JFDV)
jellyfish attack prevention
jellyfish attack detection
Jellyfish Attack
DoS attack
delays
Conferences
Compositionality
biblio
New approach through detection and prevention of wormhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:38am
mobile computing
wormhole attack
wireless mobile nodes
Victimization
unique wormhole detection and prevention algorithm
tunneling
temporary network topologies
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Aerospace electronics
Mobile communication
Mobile adhoc Network
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
malicious node
Local Area Network consists
full routing method.
electromagnetic radio waves
contagious nodes
Compositionality
attack prevention
arbitrary network topologies
biblio
Novel IDS security against attacker routing misbehavior of packet dropping in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:32am
Nodes
telecommunication security
telecommunication network routing
security
Secure Routing
routing. Security
Routing protocols
Routing
Resiliency
resilience
Receivers
pubcrawl
Packet dropping
Attack detection
mobile ad hoc networks
mobile ad hoc network
Metrics
Measurement
MANET
Malicious Attacker
intermediate nodes
IDS security system
IDS
Compositionality
attacker routing misbehavior
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »