Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious nodes
biblio
A Multidimensional Trust Model for Vehicular Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 11:18am
Ad Hoc Network Security
Ad hoc networks
Compositionality
Computational modeling
Conferences
fault tolerance
Fault tolerant systems
malicious nodes
Metrics
pubcrawl
Resiliency
security
trust
VANET
Vehicular Ad-hoc Network
Wireless communication
biblio
Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)
Submitted by aekwall on Tue, 03/09/2021 - 11:36am
Packet loss
ns2
normal network conditions
largest remaining energy
flooding attack AODV routing protocol
Flooding Attack
energy-efficient AODV
energy parameters
different network conditions
Black hole attacks
Vehicular Ad-hoc Network
Performance analysis
wireless technology
Black hole attack
Energy
AODV
Scalability
data communication
Blackhole attack
Throughput
VANET
quality of service
delays
Energy Efficiency
Wireless communication
vehicular ad hoc networks
malicious nodes
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
Prevention of DoS Attacks by Detection of Multiple Malicious Nodes in VANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
Roads
network throughput
packet delivery ratio
Packet detection
packet detection algorithm
packet loss ratio
pubcrawl
resilience
Resiliency
network availability
Safety
Safety messages
Technology management
VANET
VANETs
vehicle nodes
vehicular ad hoc networks
vehicular adhoc network
driver safety
automation
Compositionality
computer network security
critical information
Denial of Service attacks
detection algorithms
DoS attacks
DoS attacks prevention
manet attack prevention
irrelevant data
irrelevant packets
Jamming
malicious nodes
MANET Attack Detection
Metrics
multiple malicious nodes
biblio
An Identity Privacy Protection Strategy in Vehicle Named Data Network
Submitted by grigby1 on Fri, 05/29/2020 - 2:53pm
malicious nodes
vehicular ad hoc networks
vehicle opportunity network
vehicle named data network
Security analysis
Scalability
ring signature scheme
Resiliency
resilience
pubcrawl
privacy protection
privacy problems
ONE-based VNDN platform
Named Data Network Security
anonymity
internet
interest packages
Identity Security
identity privacy protection strategy
identity information
Human behavior
digital signatures
data requester
data provider
data privacy
data packets
data names
computer network security
biblio
Efficient Route Identification Method for Secure Packets Transfer in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
regular node mobility
mobile nodes
MANET security
efficient route identification method
fundamental system convenience
malicious nodes
MANET routing Methods
mobile ad hoc network routing
novel secure routing method
Power demand
route discovery process
route selection
route topology
routing table
routing table info
routing technique
secure packets transfer
secured route identification
telecommunication network routing
telecommunication security
security
remote system
Resiliency
pubcrawl
Routing
trusted nodes
Metrics
Conferences
network topology
Topology
secure data transmission
MANET
mobile ad hoc networks
telecommunication network topology
energy consumption
Compositionality
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 3:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
mobile computing
Wormhole tunnel
wormhole attack detection
wireless medium
Wireless communication
telecommunication security
telecommunication network routing
Routing
Resiliency
pubcrawl
network level
Communication system security
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
graph theory
Extremities
end-nodes
composability
1
2
3
next ›
last »