Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc network
biblio
Jellyfish attack detection and prevention in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:38am
JF reorder attack
telecommunication security
signal processing
sensors
security
Resiliency
resilience
pubcrawl
Protocols
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
attack prevention
JF periodic dropping attack
JF delay variance attack
JF attack delay data packets
Jellyfish Delay Variance Attack (JFDV)
jellyfish attack prevention
jellyfish attack detection
Jellyfish Attack
DoS attack
delays
Conferences
Compositionality
biblio
New approach through detection and prevention of wormhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:38am
mobile computing
wormhole attack
wireless mobile nodes
Victimization
unique wormhole detection and prevention algorithm
tunneling
temporary network topologies
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Aerospace electronics
Mobile communication
Mobile adhoc Network
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
malicious node
Local Area Network consists
full routing method.
electromagnetic radio waves
contagious nodes
Compositionality
attack prevention
arbitrary network topologies
biblio
Novel IDS security against attacker routing misbehavior of packet dropping in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:32am
Nodes
telecommunication security
telecommunication network routing
security
Secure Routing
routing. Security
Routing protocols
Routing
Resiliency
resilience
Receivers
pubcrawl
Packet dropping
Attack detection
mobile ad hoc networks
mobile ad hoc network
Metrics
Measurement
MANET
Malicious Attacker
intermediate nodes
IDS security system
IDS
Compositionality
attacker routing misbehavior
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
biblio
Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
resilience
Organizations
packet drop
Peer-to-peer computing
Protocols
pubcrawl
Quality metrics
Re-Routing
rejoining processing
Reliable Path
mobile computing
Resiliency
root nodes
Routing
Routing Protocol
Routing protocols
telecommunication channels
telecommunication network management
telecommunication security
wireless infrastructureless network
GroupKeyManagement
ad hoc environment
Ad hoc networks
Attack detection
authorized nodes
Compositionality
delays
dropped packets
EGSR schemes
group capacity
2ACK scheme
Hybrid based PSO
information transmission
internal attacks
MANET
MANETs
Metrics
mobile ad hoc network
mobile ad hoc networks
biblio
Flooding attack detection and prevention in MANET based on cross layer link quality assessment
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
link layer assessment based flooding attack detection
Topology
telecommunication security
telecommunication network routing
routing table
Routing
Resiliency
resilience
pubcrawl
network topology
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
accurate flooding attack detection
flooding node detection
Flooding Attack
Distributed Denial of Services attack
DDoS Attack
DDoS
cross layer MAC-Network interface
cross layer link quality assessment
Cross layer design
Cross Layer
Computer crime
Compositionality
Attack detection
biblio
Group signature based privacy protection algorithm for mobile ad hoc network
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
mobile computing
vehicular ad hoc networks
vehicular ad hoc network
Time delay
signature length
short group signature
Resiliency
resilience
pubcrawl
privacy protection issues
privacy protection
privacy
Packet loss rate
network model
anonymous verification
mobile ad hoc network
Metrics
message verification
MANET
group signature based privacy protection algorithm
digital signatures
Data protection
Compositionality
BBS algorithm
Batch verification
automobiles
authentication
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
Routing protocols
nods defection
open wireless medium
packet drop rate
packet dropping attack
packet forwarding
pubcrawl
reactive routing protocols
resilience
Resiliency
Routing
nodes unreliability
routing rules
security
self-configuring automatic vehicles
selfish behaviours
Selfish nodes
T-MANET
Tactical MANET
Tactical Mobile Ad-hoc NETworks
telecommunication security
Wireless communication
MANET
attack model
black hole
Compositionality
DSR routing protocol
energy consumption rate
gray hole
high dynamic network architecture
insider threat model
Insider Threats
malicious insider threats
Ad-Hoc Network
Measurement
Metrics
mobile ad hoc network
mobile ad hoc networks
network flow
Network Simulator 2
network throughput
nodes cooperation
nodes misbehavior
biblio
Black hole attack prevention method using dynamic threshold in mobile ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
mobile ad hoc network
telecommunication security
security issues
security attack
Routing protocols
routing information exchange
Routing
Resiliency
pubcrawl
network infrastructure
mobile nodes
mobile ad hoc networks
Ad Hoc Network Security
MANET
malicious node
IP networks
Human Factors
Human behavior
fake routing information
dynamic threshold
data packets
composability
black hole node detection rate
black hole attack prevention method
« first
‹ previous
1
2
3
4
5
6
next ›
last »