Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad-hoc network
biblio
Gray hole attack detection in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
pubcrawl
MD6 security algorithm
Message Digest 5
Metrics
mobile ad hoc networks
mobile ad-hoc network
Mobile communication
mobile computing
networking system
MD5 algorithm
resilience
Resiliency
routing overhead
Routing protocols
self-stabilizing election algorithm
telecommunication network routing
telecommunication security
voting
dynamic cluster head selection
Ad-hoc on demand distance vector protocol
AES security algorithm
Attack detection
batteries
battery power
Clustering algorithms
Compositionality
data transmission rate
Ad hoc networks
dynamic nodes
Election Algorithm
gray hole attack detection
gray hole nodes
identical broadcast range
intrusion detection system
intrusion revealing system
MANET
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
Proactive secret sharing for long lived MANETs using Elliptic Curve Cryptography
Submitted by grigby1 on Wed, 06/20/2018 - 11:22am
Ad hoc networks
bi-variate polynomial
Compositionality
Elliptic curve cryptography
MANET
Metrics
mobile ad-hoc network
mobile computing
proactive
Protocols
pubcrawl
resilience
Resiliency
secret sharing technique
security
threshold cryptography
biblio
Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET
Submitted by K_Hooper on Wed, 05/09/2018 - 10:03am
mobile computing
wireless movable nodes
telecommunication security
Security Heuristics
Scalability
Resiliency
pubcrawl
particle swarm optimization
particle swarm optimisation
network simulator
multiple gray hole attack
mobile nodes
Cooperative Gray Hole attack
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
meta heuristic
MANET
malicious node
intermediate nodes
gray hole attack prevention
data packets
biblio
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
quality-of-service constraints
Yices SMT Solver
Trust Routing
SMT-LIB language
SMT-LIB
security
secure routing protocol
Scalability
Routing protocols
Routing Protocol
routing functions
Routing
Resiliency
resilience
requirement models
requirement constraints
Adaptation models
quality of service
QoS constraints
pubcrawl
network topology
mobile nodes
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
MANET
formal verification
formal modelling
composability
adaptive routing protocol
biblio
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
Submitted by K_Hooper on Wed, 09/27/2017 - 12:21pm
Ad hoc networks
detection
Human behavior
mobile ad-hoc network
Multi-hope
Prevention
pubcrawl
Resiliency
scalabilty
security
tunneling
wormhole attack
biblio
An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks
Submitted by K_Hooper on Wed, 09/27/2017 - 12:21pm
Ad hoc networks
Algorithms
Human behavior
Intrusion Response
mobile ad-hoc network
OLSR
pubcrawl
Resiliency
scalabilty
biblio
An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks
Submitted by grigby1 on Wed, 08/02/2017 - 12:41pm
Algorithms
detection
Intrusion Response
manet attack prevention
mobile ad-hoc network
OLSR
pubcrawl
biblio
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
Submitted by grigby1 on Wed, 08/02/2017 - 12:40pm
detection
manet attack prevention
mobile ad-hoc network
Multi-hope
Prevention
pubcrawl
security
tunneling
wormhole attack
biblio
Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET)
Submitted by grigby1 on Mon, 03/13/2017 - 11:23am
mobile ad-hoc network
wumpus world concept
wireless mesh networks
telecommunication security
telecommunication network topology
telecommunication network routing
telecommunication network reliability
security enhancement
security
Routing attack
Routing
network topology
network survivability
network partitioning
mobile computing
Mobile communication
AMMNET
mobile ad hoc networks
Mesh networks
MANET
intragroup bridge router
intergroup bridge router
denial of service (dos)
computer architecture
communication reliability
Blackhole attack
Blackhole
bait detection scheme
Bait approach
Autonomous Mobile Mesh Network (AMMNET)
autonomous mobile mesh network
Artificial Intelligence
« first
‹ previous
1
2
3
next ›
last »