Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc network
biblio
Development of an Intrusion Detection System Prototype in Mobile Ad Hoc Networks Based on Machine Learning Methods
Submitted by grigby1 on Fri, 12/09/2022 - 5:28pm
intrusion detection system
Ad Hoc Network Security
DDoS Attack
mobile ad hoc network
Blackhole attack
Measurement
network topology
composability
Prototypes
machine learning
telecommunication traffic
Throughput
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
biblio
New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques
Submitted by aekwall on Mon, 02/07/2022 - 4:10pm
Intrusion Detection System (IDS)
MANET Attack Detection
mobile ad hoc network
Naive Bayes
support vector machine
Random Forest
random forests
Radio frequency
network intrusion detection
Support vector machines
Routing protocols
Compositionality
Resiliency
Metrics
pubcrawl
machine learning
Training
Routing
biblio
Detection and Prevention of Wormhole Attack Using the Trust-Based Routing System
Submitted by grigby1 on Mon, 11/08/2021 - 3:47pm
Warm Hole Attack
Trust Routing
Trust-Based System
Scalability
Routing protocols
Routing
Resiliency
resilience
pubcrawl
multi-path routing
mobile ad hoc networks
mobile ad hoc network
encryption
composability
ad hoc on-demand distance vector
biblio
Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing
Submitted by aekwall on Tue, 03/09/2021 - 11:38am
mobile ad hoc networks
trust-based routing scheme
trust-based routing
telecommunication security
Scalability
Routing protocols
Routing Protocol
routing environment
Routing
Resiliency
reactive protocol
pubcrawl
packet delivery ratio
node data transfer mechanism
mobile nodes
Trust Routing
mobile ad hoc network
MANET
Energy states
data transaction
data retrieval
data packet
black-hole attack
Black hole attacks
Black hole attack
Attacker node
and trust-based scheme
Ad-hoc On-demand Distance Vector
Ad-doc On-Demand Distance Vector (AODV) protocol
biblio
A Review on Prevention and Detection Schemes for Black Hole Attacks in MANET
Submitted by aekwall on Tue, 03/09/2021 - 11:37am
mobile ad hoc network
telecommunication security
telecommunication network topology
Scalability
Routing protocols
Routing
Resiliency
quality of service
pubcrawl
Performance Metrics
mobile ad hoc networks
manet attack prevention
MANET
delays
collaboration
changing topology
Black hole attacks
black hole attack prevention
black hole attack detection
Black hole attack
ad hoc network
biblio
Mitigation Technique for Black hole Attack in Mobile Ad hoc Network
Submitted by aekwall on Tue, 03/09/2021 - 11:36am
mobile ad hoc networks
Random Mobility
network scenario
Gray hole attack
device communication
Black hole attacks
Black hole attack
mitigation technique
mobile ad hoc network
Throughput
Scalability
quality of service
delays
Routing protocols
Wireless communication
Routing
pubcrawl
Resiliency
telecommunication security
biblio
Performance Evaluation of DSR Protocol in MANET Untrustworthy Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:02pm
mobile ad hoc networks
untrue nodes
Throughput
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
pernicious hubs
performance evaluation
network security
network attacks
ad hoc network
mobile ad hoc network
Metrics
MANET untrustworthy environment
genuine setting
Dynamic Source Routing (DSR)
DSR protocol
DSR convention
directing convention
Compositionality
Adhoc network
ad hoc systems
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
probability
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
Mean-field game
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
Human Factors
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
actor-critic-mass algorithm
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
biblio
A Neighbor Trust-Based Mechanism to Protect Mobile Networks
Submitted by aekwall on Mon, 11/02/2020 - 1:42pm
malicious attacks
manet privacy
temporal link
neighbor trust-based security scheme
neighbor trust-based mechanism
mobile network protection
Mobie ad hoc networks
malicious function
mobile nodes
Trust management
telecommunication security
Compositionality
Mobile communication
mobile ad hoc network
mobile ad hoc networks
MANET
Metrics
privacy
pubcrawl
Resiliency
biblio
A Secure Identity-based Deniable Authentication Protocol for MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
mobile ad hoc networks
manet privacy
secure identity-based deniable authentication protocol
identity-based cryptosystem
identity-based cryptography
IBDA protocol
heavy computational communication overhead
Deniable authentication
Bilinear Pairing
adequate security
mobile nodes
Compositionality
mobile devices
elliptic curve
mobile ad hoc network
mobile computing
Cryptography
MANET
Elliptic curves
Elliptic curve cryptography
public key cryptography
mobile radio
Ad hoc networks
message authentication
authentication
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
1
2
3
4
5
6
next ›
last »