Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious nodes
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 1:01pm
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 9:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 8:05am
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks
biblio
A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 7:57am
MANETs Security Issues
wireless links
security of data
Routing
Reliability engineering
Qualnet simulator 6.1
packet dropping attack
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
mobile ad hoc network
Ad hoc networks
MANET
Mamdani fuzzy inference system
malicious nodes
Intrusion Detection System (IDS)
intrusion detection system
inference mechanisms
Fuzzy sets
Fuzzy logic
data packets
Artificial Intelligence
« first
‹ previous
1
2
3