Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
node mobility
biblio
Cluster based Intrusion Detection System for Mobile Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
mobile ad hoc networks
voting
security of data
Routing protocols
Routing Protocol
route structure
Resiliency
pubcrawl
pattern clustering
node mobility
network traffics
network securities
monitoring process
Monitoring
mobility management (mobile radio)
mobile ad-hoc network
MANET Attack Detection
Metrics
memory overhead
MANET
malicious node
Intrusion Detection
DRINA Intrusion
Compositionality
clustering protocols
cluster based Intrusion detection planning
cluster
CBIDP
ad-hoc node security
Ad Hoc Network Security
active monitoring node
biblio
Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
Resiliency
NDN
node mobility
performance tuning
Policy
Policy Based Governance
policy governance
practical adoption
Protocols
pubcrawl
resilience
Named Data Networking (NDN)
stable connections
tactical applications
tactical edge networks
tactical environments
tactical networks
transport protocols
unreliable capacity limited performance
wireless nature
wireless sensor networks
ICN
application-specific extensions
clean slate
clean slate networking approach
collaboration
communication scenario
Engines
Face
fairly stable infrastructure-based environments
Human behavior
Human Factors
Ad hoc networks
information centric networking
Information-Centric Networking (ICN)
internet
IP networks
Metrics
military communication
mobile computing
mobile military networks
named data networking
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
biblio
A new anti-jamming reliable routing protocol for tactical MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Routing protocols
neighboring node
node mobility
pubcrawl
Reliability
resilience
Resiliency
Routing
Routing Protocol
neighbor dependency
security
tactical communications
Tactical MANET
Tactical MANETs
telecommunication network reliability
telecommunication security
Wireless communication
Anti-jamming
mobile ad hoc networks
military communication
Metrics
Measurement
MANET
malicious jamming attacks
link stability evaluation
jamming interference
Jamming
Interference
exponential smoothing estimation
data transmission reliability
Compositionality
channel state information
anti-jamming reliable routing protocol
biblio
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:10am
malware
wireless links
service requests
quadratic growth
Peer-to-peer computing
node mobility
network bandwidth
mobility range
mobile services
mobile nodes
mobile networks
mobile malware
mobile computing
mobile botnets
botnet propagation storms
last chipper time
invasive software
Internet botnets
internet
exponential growth
epidemic modeling
distributed mechanism
denial-of-service impact
data forwarding
coordinated attacks
computer network security
compromised nodes