Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious node detection
biblio
A Time Interval Based Blockchain Model for Detection of Malicious Nodes in MANET Using Network Block Monitoring Node
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
Block Analysis
Compositionality
Conferences
data communication
malicious node detection
MANET Attack Detection
Metrics
mobile ad hoc networks
Monitoring
Network Block Monitoring Node
pubcrawl
resilience
Resiliency
Routing
routing table
Time Interval Based Blockchain Model
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 1:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
Detection of malicious node in mobile ad-hoc network
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
mobile ad hoc networks
wireless links
Wireless communication
telecommunication network routing
selective acknowledgment
security
Routing protocols
routing overhead
Routing
Resiliency
pubcrawl
NS2 simulation
network security
network packet delivery ratio
mobile nodes
Ad Hoc Network Security
mobile ad hoc network
Metrics
MANET
malicious node detection
malicious node
intrusion detection mechanisms
firewalls software
firewalls
encryption software
Cryptography
Compositionality
Communication system security
AODV
adaptive acknowledgment
biblio
Efficient Network Path Verification for Policy-routedQueries
Submitted by grigby1 on Tue, 05/30/2017 - 12:55pm
peer to peer security
security
Scalability
resource discovery
Resiliency
query routing
pubcrawl
privacy
peer-to-peer security
collaboration
path verification
p2p security
network routing
Metrics
malicious node detection
Human behavior
Control Theory
composability
biblio
Research of trust model based on fuzzy theory in mobile ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:55am
mobile ad hoc network security
trust-based multicast routing protocol
trust model
telecommunication security
Routing protocols
network trust dynamic adaptability
network interaction quality
multiple trust decision factor
multicast protocols
multi-agent systems
multi-agent system
mobile ad hoc networks
analytic hierarchy process
malicious node detection
information-theoretic framework
fuzzy theory
fuzzy set theory
Fuzzy logic
fuzzy analytic hierarchy process theory
FAPtrust
entropy weight method
decision-making
Decision Making