Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad-hoc networks
biblio
A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 5:29pm
composability
Wireless communication
security
secure group communication
resilience
Receivers
Protocols
performance evaluation
Optimized production technology
mobile ad-hoc networks
key management
authentication
Ad hoc networks
Ad Hoc Network Security
Access Control
Human behavior
Metrics
Resiliency
Scalability
pubcrawl
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by grigby1 on Thu, 10/29/2020 - 10:59am
live migrations
Virtualization
vehicular cloud computing
Vehicular cloud
VCC
untrustworthy IoT environments
Task Analysis
security
Resiliency
resilience
pubcrawl
mobile ad-hoc networks
Metrics
MANETs
manet privacy
Ad-hoc Cloud
IoT networks
IoT devices
IoT
Intrusion Detection
Internet of Things
Fog computing
fog architecture
edge computing
Containers
computer network security
computer architecture
computational devices
Compositionality
Cloud Computing
biblio
Motion-Aware Clock Synchronization for Mobile Ad-Hoc Networks
Submitted by aekwall on Mon, 06/15/2020 - 10:02am
clock synchronization accuracy
round-trip-time correction
resource-constrained scenes
motion-aware clock synchronization
motion information
mobile ad-hoc networks
high-speed scenes
high-speed MANET applications
conventional synchronization algorithms
clock synchronization algorithm
telecommunication security
clock synchronization
forward error correction
mobile ad hoc networks
Metrics
synchronisation
composability
pubcrawl
Resiliency
biblio
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
Mobile ad hoc networks (MANETs)
ad hoc nature
AODV protocol
battery power
central authority
dynamic topologies
IEEE 802.11ac protocol
industrial fields
memory space
Blackhole attack
mobile ad-hoc networks
mobility model
multiple Blackhole attack
NS-3 simulator
NS-3.27 simulator
OLSRprotocol
physical protection
single Blackhole attack
network nodes
telecommunication security
network security
Resiliency
pubcrawl
Routing protocols
Routing
mobile radio
delays
Scalability
Relays
wireless LAN
MANET
mobile ad hoc networks
telecommunication network topology
Ad hoc networks
mobile computing
fixed infrastructure
biblio
Game Theoretical Approach with Audit Based Misbehavior Detection System
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
mobile ad-hoc networks
dynamically shifting nodes
end-to-end encrypted traffic
GAMD
game theoretical approach
incentive based reputation scheme
incentive schemes
MANET environment
misbehaving nodes
misbehavior nodes
continuous packet droppers
multichannel networks
multihop ad hoc networks
node behavior
per-packet basis
selective dropping attacks
selective packet droppers
Selfish node
supervisory game
theoretical cryptography
Routing protocols
Monitoring
pubcrawl
composability
Conferences
game theory
Ad hoc networks
telecommunication security
Peer-to-peer computing
Routing
Games
Cryptography
Compositionality
MANET
mobile ad hoc networks
mobile nodes
AMD
Audit based Misbehavior Detection system
Audit-based Misbehavior Detection
biblio
Audit-based efficient accountability for node misbehavior in wireless sensor network
Submitted by grigby1 on Mon, 06/11/2018 - 2:39pm
Routing
network functions
network nodes
node behavior
node misbehavior
Peer-to-peer computing
pubcrawl
resilience
Resiliency
network accountability
selective packet droppers
self-organized networks
spread spectrum communication
telecommunication network management
telecommunication network routing
Wireless Sensor Network
wireless sensor networks
Ad hoc networks
multihop ad hoc networks
multichannel networks
Monitoring
mobile ad-hoc networks
mobile ad hoc networks
misbehaving nodes
Metrics
faulty nodes
Cryptography
continuous packet droppers
composability
behavioral audits
Audit-based Misbehavior Detection
audit-based efficient accountability
AMD
biblio
Improving Trusted Routing by Identifying Malicious Nodes in a MANET Using Reinforcement Learning
Submitted by grigby1 on Wed, 04/11/2018 - 2:02pm
Protocols
vehicular networks
trusted routing
Trust Routing
trust
telecommunication security
self-organizing communication systems
security
Scalability
Routing
Resiliency
resilience
reliable trust improvement
reinforcement learning agent
Reinforcement learning
pubcrawl
ad-hoc on-demand distance vector protocol
Peer-to-peer computing
mobile conferences
mobile ad-hoc networks
mobile ad hoc networks
military operations
MANET
malicious nodes
malicious behaviour
learning (artificial intelligence)
healthcare systems
dynamic wireless connections
dynamic MANET environment
composability
AODV protocol
AODV
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 1:01pm
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 8:05am
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks
1
2
next ›
last »