Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANETs
biblio
Wormhole Attack Detection using Energy Model in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:22am
node energy
dynamic route discovery
dynamic route request
encrypted values
energy level
energy model
high power transmission
intruder nodes
network analysis
dynamic request
NS2 simulator
packet drop ratio
performance curves
static table driven technique
unsecure transmission
wormhole attack detection
MANET Attack Detection
wormhole attacks
pubcrawl
Metrics
resilience
Resiliency
telecommunication network routing
Compositionality
network communication
wormhole attack
Cryptography
AODV
end to end delay
MANETs
mobile ad hoc networks
AODV routing
Apptool
Apptool simulator
biblio
Comparitive Analysis of Blackhole and Rushing Attack in MANET
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
NS-2 network simulator
wireless networking technology
telecommunication security
Scalability
Rushing attack.
rushing attack
Routing protocols
Resiliency
resilience
pubcrawl
packet delivery ratio
AODV
network layer attack
mobile ad hoc networks
MANETs
MANET
end to end delay
data forwarding operations
centralized network administration
Blackhole attack
Black hole attack
AODV routing protocol
biblio
Behaviour Analysis and Detection of Blackhole Attacker Node under Reactive Routing Protocol in MANETs
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Scalability
Resiliency
pubcrawl
Routing
Routing protocols
collaboration
Throughput
MANETs
Ad hoc networks
mobile computing
AODV
Blackhole attack
Blackhole
Energy
PDR
Routing Protocol
biblio
DSOR: A Traffic-Differentiated Secure Opportunistic Routing with Game Theoretic Approach in MANETs
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
Compositionality
Computer Theory and Trust
composability
game theoretic security
Human Factors
MANETs
Predictive Metrics
pubcrawl
Scalability
secure opportunistic routing
traffic-differentiated
trust
Trust Routing
biblio
Countering Control Message Manipulation Attacks on OLSR
Submitted by aekwall on Mon, 06/10/2019 - 9:19am
MANET security
blackhole attacks
composability
MANET Attack Mitigation
MANETs
Metrics
Olsr Routing
pubcrawl
Resiliency
trust computation
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification
Submitted by aekwall on Mon, 06/10/2019 - 9:15am
routing procedure
multiple malicious nodes
passive attacks
privacy
pubcrawl
reasoning rules
Resiliency
Routing
routing phases
mobile computing
routing security
security
Syslog
telecommunication network routing
telecommunication security
verification
verification phase
active attacks
mobile ad hoc networks
Metrics
Merkle hash tree
MANETs routing
MANETs
MANET Attack Detection
log-based anomalies detection
flow graphs
flow graph
Diagnostics
composability
cognition
central control program
Anomaly Detection
Ad hoc networks
biblio
Reputation and trust based selfish node detection system in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 9:15am
mobile ad hoc network
trust based selfish node detection system
telecommunication network routing
selfish
Routing protocols
routing layer
Routing
Resiliency
pubcrawl
packet forwarding
node authentication
node
network channel jamming
mobile ad hoc networks
Base stations
misbehavior
Metrics
Measurement
MANETs
MANET Attack Detection
MANET
Load modeling
detection
control systems
Conferences
composability
cellular telephones
biblio
Evaluation of Detection Method to Mitigate DoS Attacks in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 9:15am
Ad hoc networks
composability
DoS
Filtering
Firewalls (computing)
MANET Attack Detection
MANETs
Metrics
mobile computing
Monitoring
MrDR
pubcrawl
Resiliency
Routing
Routing protocols
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 9:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
« first
‹ previous
1
2
3
next ›
last »