Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANETs
biblio
Impact of Bushfire Dynamics on the Performance of MANETs
Submitted by grigby1 on Tue, 02/08/2022 - 10:48am
Handover
MANET security
Bushfire Communications
Unmanned Aerial Vehicles
QoI
Degradation
MANETs
simulation
Compositionality
Forestry
Ad hoc networks
composability
Wireless communication
Resiliency
resilience
Metrics
pubcrawl
biblio
B4SDC: A Blockchain System for Security Data Collection in MANETs
Submitted by aekwall on Mon, 08/02/2021 - 2:11pm
Task Analysis
pubcrawl
Metrics
Resiliency
blockchain
Compositionality
Ad hoc networks
Data collection
Incentive mechanism
MANETs
mobile computing
Nickel
security-related data collection
MANET security
biblio
An adaptive approach for Detecting Blackhole using TCP Analysis in MANETs
Submitted by grigby1 on Mon, 12/28/2020 - 12:03pm
security
mobile radio
multipath
ns2
popular attack
pubcrawl
recent few years
reliable transport layer protocol TCP
resilience
Routing protocols
mobile ad-hoc network
self-configuring
society amd researchers
TCP
TCP analysis
telecommunication network reliability
telecommunication security
transport protocols
unstructured networks
Blackhole attack
Resiliency
Metrics
Compositionality
ad hoc network
Ad hoc networks
adaptive approach
Adhoc network
AODV
manet privacy
central controlling authority
different circumstance
dynamic absence
information security
infra less environment
MANET
MANETs
mobile ad hoc networks
biblio
Network-based Anomaly Intrusion Detection System in MANETS
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
network intrusion detection
wireless networks
wireless network
wireless Adhoc networks
wired environment
telecommunication security
security of data
security
Routing protocols
Resiliency
resilience
pubcrawl
pre-existing unfolding solutions
Network-based anomaly intrusion detection system
Network Simulator-2
network protocols
MANET Attack Detection
mobile radio
mobile adhoc networks
mobile ad hoc networks
Metrics
MANETs
intrusion detection techniques
intrusion detection system
infrastructure-less networks
IDS
fixed wired network
Compositionality
component
Ad hoc networks
ad hoc network
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 10:59am
mobile computing
telecommunication security
security
Resiliency
resilience
pubcrawl
policy based security
policy based approach
ns 2
mobile nodes
authorization
mobile ad hoc networks
mobile ad hoc network
Metrics
messages dissemination
MANETs
manet privacy
data privacy
Compositionality
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by grigby1 on Thu, 10/29/2020 - 10:59am
live migrations
Virtualization
vehicular cloud computing
Vehicular cloud
VCC
untrustworthy IoT environments
Task Analysis
security
Resiliency
resilience
pubcrawl
mobile ad-hoc networks
Metrics
MANETs
manet privacy
Ad-hoc Cloud
IoT networks
IoT devices
IoT
Intrusion Detection
Internet of Things
Fog computing
fog architecture
edge computing
Containers
computer network security
computer architecture
computational devices
Compositionality
Cloud Computing
biblio
Anonymous Routing Protocols in MANETs, a Security Comparative Analysis
Submitted by grigby1 on Thu, 10/29/2020 - 10:58am
mobile ad hoc networks
telecommunication security
special type
self organized fashion
security comparative analysis
Routing protocols
Routing
Resiliency
resilience
pubcrawl
private routing protocols
privacy
performance capabilities
mobile computing
Ad hoc networks
mobile ad hoc network
military environments ones
Metrics
MANETs
manet privacy
MANET
fixed infrastructure
Cryptography
Compositionality
communication secrecy
civil environments ones
anonymous routing protocols
anonymous routing
biblio
A Reputation Management Framework for MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:58am
pubcrawl
trusted mobile ad hoc networks
Trusted Computing
trust information
security of data
Resiliency
resilience
reputation system
reputation management system
attack
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs
manet privacy
malicious information
malicious attacks
Compositionality
biblio
Anatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
Technology management
MANET Attack Detection
security attack
portable hubs
performance measure techniques
Packet loss
network parameters
mobile hubs
mobile ad-hoc network
MANETSs
inactive attack
Dynamic attack
detection anatomization
decentralized validation
security
mobile computing
automation
mobile ad hoc networks
MANETs
Flooding Attacks
Compositionality
Routing protocols
Ad hoc networks
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
1
2
3
next ›
last »