Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc network
biblio
Enhancing security for load balanced energy enhanced clustered bee ad hoc network using secret public keys
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
pubcrawl
wireless network
telecommunication security
Security Public Key Cryptography
security
secured PKI scheme
secret public keys
Routing protocols
Routing
resource allocation
Resiliency
public key cryptography
Ad Hoc Network Security
path selection
mobile ad hoc networks
mobile ad hoc network
MANET
load balanced energy enhanced clustered bee ad hoc network
LBEE
Human Factors
Human behavior
Energy Efficiency
composability
biblio
A Distributed and Adaptive Trust Evaluation Algorithm for MANET
Submitted by grigby1 on Mon, 06/05/2017 - 12:44pm
Ad hoc networks
adaptive
collaboration
composability
distributed
Human behavior
malicious attacks.
MANET security
Metrics
mobile ad hoc network
pubcrawl
Resiliency
Scalability
trust evaluation
biblio
Advances In Distributed Security For Mobile Ad Hoc Networks
Submitted by grigby1 on Mon, 03/20/2017 - 10:12am
Ad hoc networks
AES
Attribute authority
attribution
certificate
composability
Cryptography
firewall
Human behavior
MANET security
Metrics
mobile ad hoc network
pubcrawl
public key infrastructure
RSA
biblio
Secure Routing with an Integrated Localized Key Management Protocol in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 1:33pm
mobile ad hoc network (MANET)
Secure Routing
routing security
Routing protocols
Routing Protocol
Routing
public key cryptography
Public key
neighbor based handshaking and least common multiple
mobile computing
mobile ad hoc networks
Ad hoc networks
mobile ad hoc network
MANET
key management protocol
key management
Intrusion Detection System (IDS)
intrusion detection system
integrated localized key management protocol
Cryptographic Protocols
broadcast key distribution mechanism
authentication
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator
biblio
A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 8:57am
MANETs Security Issues
wireless links
security of data
Routing
Reliability engineering
Qualnet simulator 6.1
packet dropping attack
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
mobile ad hoc network
Ad hoc networks
MANET
Mamdani fuzzy inference system
malicious nodes
Intrusion Detection System (IDS)
intrusion detection system
inference mechanisms
Fuzzy sets
Fuzzy logic
data packets
Artificial Intelligence
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:28am
mobile agents
WSN
wireless sensor networks
Wireless Sensor Network
Unified modeling language
telecommunication security
security
research issues
Monitoring
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
MANET
Intrusion Detection Systems
Intrusion Detection
IDS guidelines
IDS
« first
‹ previous
1
2
3
4
5
6