Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET security
biblio
Neighbor Contamination to Achieve Complete Bottleneck Control
Submitted by grigby1 on Thu, 05/18/2017 - 2:26pm
Compositionality
detection
expandability
Human behavior
Internet of Things
location privacy
MANET
manet attack prevention
MANET security
Metrics
mobile
network bottlenecks
pubcrawl
Resiliency
wireless networks
Wormhole
biblio
Advances In Distributed Security For Mobile Ad Hoc Networks
Submitted by grigby1 on Mon, 03/20/2017 - 10:12am
Ad hoc networks
AES
Attribute authority
attribution
certificate
composability
Cryptography
firewall
Human behavior
MANET security
Metrics
mobile ad hoc network
pubcrawl
public key infrastructure
RSA
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 2:01pm
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 9:05am
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks
« first
‹ previous
1
2
3
4
5