Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANETs
biblio
Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
resilience
Organizations
packet drop
Peer-to-peer computing
Protocols
pubcrawl
Quality metrics
Re-Routing
rejoining processing
Reliable Path
mobile computing
Resiliency
root nodes
Routing
Routing Protocol
Routing protocols
telecommunication channels
telecommunication network management
telecommunication security
wireless infrastructureless network
GroupKeyManagement
ad hoc environment
Ad hoc networks
Attack detection
authorized nodes
Compositionality
delays
dropped packets
EGSR schemes
group capacity
2ACK scheme
Hybrid based PSO
information transmission
internal attacks
MANET
MANETs
Metrics
mobile ad hoc network
mobile ad hoc networks
biblio
A review on VANET security attacks and their countermeasure
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
Resiliency
world VANET
Wireless communication
vehicular ad hoc networks
VANETs wireless communication
VANETs architecture
VANETs
VANET technology
VANET security attacks
V2Vcommunication
telecommunication security
smart cities
security issues
security
Roads
attacks
resilience
pubcrawl
privacy properties
privacy
mobile computing
Metrics
MANETs
MANET
infrastructure communication
ECDSA
DSRC
Cryptography
Compositionality
authentication
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:53am
centralised key manager
dynamic topology
MANETs
mobile ad hoc networks
multicast communication
multicast transmission security
network simulator tool
private key cryptography
private key distribution
public key cryptography
rekeying technique
secure intercluster communication technique
tamper data proofing
telecommunication security
biblio
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:53am
Mean field game
telecommunication security
system resources
strategic security defence decisions
security game model
security enhancements
security
mobile computing
mobile ad hoc networks
mobile ad hoc network (MANET)
mean field game theoretic approach
Ad hoc networks
mathematical tool
Mathematical model
MANETs
Games
game theory
fully distributed scheme
Equations
centralized administration
Approximation methods
« first
‹ previous
1
2
3