Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc network
biblio
Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric
Submitted by grigby1 on Mon, 03/09/2020 - 2:39pm
mobile ad hoc network
telecommunication security
telecommunication network reliability
Security Metrics
security
Routing protocols
Routing
Resiliency
reliability metric
Reliability engineering
ns-2.35 simulation software
network reliability
network nodes
mobile ad-hoc network
mobile ad hoc networks
pubcrawl
Metrics
Measurement
MANET
gray hole node
gray hole attack analysis
Gray hole attack
Compositionality
common security attacks
AODV routing protocol
AODV
ad hoc on demand distance vector routing protocol
Ad Hoc Network Security
active research work
biblio
Analytical Study on Mobile Ad Hoc Networks for IPV6
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
Mobile impromptu systems
wireless gadget connections
Wireless communication
transport protocols
telecommunication traffic
Technological innovation
TCP-IP
steering conventions
self arranging system
Resiliency
resilience
pubcrawl
protocol
policy-based governance
pervasive computing
Base stations
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
IPV6 systems
ipv6 security
IPv6 MANET
IPv4 MANET
IP networks
Handheld computers
computer network security
composability
Communication system security
collaboration
biblio
Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
mobile computing
wireless technology
telecommunication security
telecommunication network topology
security challenges
security
Routing protocols
Routing
router
Resiliency
resilience
pubcrawl
mobile nodes
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs Security
MANETs Attacks
MANET topology
MANET security
MANET protocol stack
Compositionality
blackhole attacks
base station
biblio
Watchdog and Pathrater based Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing table
open nodes
pathrater
pathrater method
Peer-to-peer computing
pubcrawl
Resiliency
Routing
Routing protocols
network topology
security
security of data
Sinkhole attack
telecommunication security
unwanted malicious attacks
Watchdog
watchdog method
Ad-hoc On-demand Distance Vector
mobile radio
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
fake route
effective intrusion detection system
dynamic source routing
computer network security
composability
broad distribution
AODV routing protocol
biblio
Reputation and trust based selfish node detection system in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobile ad hoc network
trust based selfish node detection system
telecommunication network routing
selfish
Routing protocols
routing layer
Routing
Resiliency
pubcrawl
packet forwarding
node authentication
node
network channel jamming
mobile ad hoc networks
Base stations
misbehavior
Metrics
Measurement
MANETs
MANET Attack Detection
MANET
Load modeling
detection
control systems
Conferences
composability
cellular telephones
biblio
Detection of malicious node in mobile ad-hoc network
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
mobile ad hoc networks
wireless links
Wireless communication
telecommunication network routing
selective acknowledgment
security
Routing protocols
routing overhead
Routing
Resiliency
pubcrawl
NS2 simulation
network security
network packet delivery ratio
mobile nodes
Ad Hoc Network Security
mobile ad hoc network
Metrics
MANET
malicious node detection
malicious node
intrusion detection mechanisms
firewalls software
firewalls
encryption software
Cryptography
Compositionality
Communication system security
AODV
adaptive acknowledgment
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol
biblio
Attacks and mitigation techniques on mobile ad hoc network \#x2014; A survey
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
mobile ad hoc networking
ubiquitous computing
telecommunication network routing
Sybil attack
routing table
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
attack mitigation
mobile ad hoc network
mitigation techniques
military search operations
military rescue operations
Metrics
Market research
MANET
Compositionality
civilian environment
attacks techniques
attacks in manet
biblio
A secure reputation based architecture for MANET routing
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
Routing
Node identity
Prime Product Number
pubcrawl
Reliability
reputation level table
Reputation Value
resilience
Resiliency
Monitoring
Routing misbehavior
Routing protocols
secure reputation based architecture
secure routing protocol
specific prime number
telecommunication security
Wireless ad hoc network
Worm hole attacks
legitimacy value table
backbone network
civilian domains
Compositionality
Cryptography
denial of service
Denial of Service attacks
DoS attacks
grid structure
attack mitigation
malicious node effect mitigation
MANET
MANET routing
Metrics
military domains
mobile ad hoc network
mobile ad hoc networks
biblio
Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Resiliency
wormhole attacks
wormhole attack
telecommunication security
sinkhole node
sinkhole attacks
Sinkhole attack
security attacks
security
secure attack aware routing
Routing protocols
Routing
AODV
resilience
pubcrawl
mobile nodes
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
Compositionality
attack prevention
Attack Aware Alert
« first
‹ previous
1
2
3
4
5
6
next ›
last »