Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious nodes
biblio
Watchdog and Pathrater based Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 9:15am
routing table
open nodes
pathrater
pathrater method
Peer-to-peer computing
pubcrawl
Resiliency
Routing
Routing protocols
network topology
security
security of data
Sinkhole attack
telecommunication security
unwanted malicious attacks
Watchdog
watchdog method
Ad-hoc On-demand Distance Vector
mobile radio
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
fake route
effective intrusion detection system
dynamic source routing
computer network security
composability
broad distribution
AODV routing protocol
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 9:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
biblio
Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 9:14am
mobile ad-hoc network
trust relationship
Throughput
telecommunication security
telecommunication network routing
single malicious node
Routing protocols
routing attacks
Routing
Resiliency
pubcrawl
packet delivery ratio
notice participation
black hole
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
Intrusion Detection
IDS
gray hole
defense mechanism
data packets
composability
biblio
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/01/2019 - 10:30am
security
lightweight monitoring system
malicious data-integrity attacks
malicious nodes
Metrics
Monitoring
network attacks
networked system
pubcrawl
resilience
Resiliency
IoT security
security of data
sensor correlations
Silicon
telecommunication security
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
WSNs
ECA rule-based wireless sensor networks
abnormal-node detection
abnormality thresholds
Correlation
data integrity
data integrity attack
data-integrity detection
dependability
dependable monitoring system
distributed system
abnormal nodes
ECA rules
embedded sensor devices
event-condition-action rule
failure handling
Fuzzy logic
heterogeneous sensor readings
hierarchical abnormal-node detection
hierarchical framework
Internet of Things
biblio
Establishing Trust by Detecting Malicious Nodes in Delay Tolerant Network
Submitted by aekwall on Mon, 03/11/2019 - 9:36am
selfish behavior
Probabilistic logic
probabilistic misbehavior detection scheme
probability
pubcrawl
Punishment
Resiliency
Routing
Scalability
probabilistic checking
Selfish node
Task Analysis
telecommunication network routing
telecommunication security
trust
Trust Routing
trusted authority
Trusted Computing
game theory analysis
compensation
composability
Conferences
delay tolerant network
delay tolerant networks
DTN
dynamic probabilistic inspection
game theory
Ad hoc networks
History
Inspection
malicious nodes
Market research
MAXTRUST scheme
Misbehavior detection
misbehavior nodes
mobile radio
biblio
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
Sybil security threat
packet delivery time synchronization
probability of detection
pseudocode algorithm
roadside unit
Routing
Spider monkey time synchronization (SMTS)
spider-monkey time synchronization technique
Sybil attack detection
Sybil attacking strategies
natural spider-monkey behavior
synchronisation
Synchronization
telecommunication power management
time division multiple access
unintended vehicles
VANETs
vehicular ad hoc networks
vehicular collisions
Metrics
destination vehicles
telecommunication security
security
Protocols
pubcrawl
composability
sybil attacks
artificial spider-monkey technique
biology
densely deployed challenge zone
security of data
dynamic VANET system
energy conservation
energy-efficient time synchronization
erroneous messages
legitimate vehicles
malicious nodes
metaheuristic stimulated framework approach
minimized energy consumption
multiple identities
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
biblio
Improving Trusted Routing by Identifying Malicious Nodes in a MANET Using Reinforcement Learning
Submitted by grigby1 on Wed, 04/11/2018 - 2:02pm
Protocols
vehicular networks
trusted routing
Trust Routing
trust
telecommunication security
self-organizing communication systems
security
Scalability
Routing
Resiliency
resilience
reliable trust improvement
reinforcement learning agent
Reinforcement learning
pubcrawl
ad-hoc on-demand distance vector protocol
Peer-to-peer computing
mobile conferences
mobile ad-hoc networks
mobile ad hoc networks
military operations
MANET
malicious nodes
malicious behaviour
learning (artificial intelligence)
healthcare systems
dynamic wireless connections
dynamic MANET environment
composability
AODV protocol
AODV
biblio
Trust-Based Protocol for Securing Routing in Opportunistic Networks
Submitted by grigby1 on Wed, 04/11/2018 - 2:02pm
pubcrawl
trust-based routing protocol
Trust Routing
telecommunication security
telecommunication network topology
store-carry-forward mechanism
securing routing
Scalability
Routing protocols
Routing
Resiliency
resilience
Ad hoc networks
Packet loss
Opportunistic Networks
Mathematical model
malicious nodes
gray-hole attack
end-to-end connection
dynamic network topology
delivery success ratio
composability
black-hole attack
biblio
A Hybrid Approach for Dynamic Intrusion Detection, Enhancement of Performance and Security in MANET
Submitted by grigby1 on Wed, 08/02/2017 - 12:41pm
AODV
Black hole attacks
DDoS attack Flooding attack
detection
malicious nodes
MANET
manet attack prevention
pubcrawl
« first
‹ previous
1
2
3
next ›
last »