Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Blackhole
biblio
A Dual Approach for Preventing Blackhole Attacks in Vehicular Ad Hoc Networks Using Statistical Techniques and Supervised Machine Learning
Submitted by aekwall on Mon, 01/10/2022 - 11:54am
Receivers
Attack vectors
VANETs
ROC
f1-score AODV
Blackhole
AUC
Accuracy
denial-of-service attack
vehicular ad hoc networks
Measurement
Human behavior
Resiliency
Scalability
pubcrawl
Public key
machine learning
Support vector machines
Robustness
biblio
Blackhole Attack Cooperative Prevention Method in MANETs
Submitted by aekwall on Mon, 08/02/2021 - 2:13pm
manet attack prevention
Ad hoc networks
AODV
Blackhole
Compositionality
Conferences
MANET
MANET security
Metrics
mobile computing
Proposals
pubcrawl
Resiliency
Routing
Routing protocols
security
biblio
Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
Scalability
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attack detection techniques
RPL based loT
RPL based routing attacks
rank attack
security
security of data
source routing protocol
Topology
version attack
Wormhole
wormhole attack
Intrusion Detection
Blackhole
Blackhole attack
computer network security
Conferences
countermeasures
IDS
IDS research contribution techniques
Internet of Things
attacks
intrusion detection system
IoT
knowledge driven approach
lightweight routing protocol stack
LLN
low power lossy networks
pubcrawl
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
Analysis of Malicious Behavior of Blackhole and Rushing Attack in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
NS-2
wireless links
telecommunication security
telecommunication network routing
security attacks
security
rushing attack
Rushing
Resiliency
quality of service
QoS metrics
pubcrawl
AODV
network nodes
Mobile adhoc Network
mobile ad hoc networks
Metrics
MANET security
MANET
malicious behavior
Compositionality
Blackhole attack
Blackhole
biblio
Behaviour Analysis and Detection of Blackhole Attacker Node under Reactive Routing Protocol in MANETs
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Scalability
Resiliency
pubcrawl
Routing
Routing protocols
collaboration
Throughput
MANETs
Ad hoc networks
mobile computing
AODV
Blackhole attack
Blackhole
Energy
PDR
Routing Protocol
biblio
Simulation Based Study of Blackhole Attack Under AODV Protocol
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Ad hoc networks
unauthorized node
target node
open access
Mobile adhoc Network
MANET nodes
Blackhole
AODV
AODV protocol
Blackhole attack
NS-2
mobile computing
Scalability
Throughput
mobile ad hoc networks
MANET
delays
Handheld computers
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
Resiliency
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
mobile ad hoc networks
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field
AODV
Metrics
MANET
IDS
high destination sequence number
destination nodes
delays
data packets
cross checking
Conferences
Compositionality
clustering
byzantine attacks
Blackhole
black-hole attack mitigation techniques
attack mitigation
biblio
Evaluation of Black Hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks
Submitted by grigby1 on Wed, 08/02/2017 - 12:41pm
Blackhole
detection
MANET
manet attack prevention
pubcrawl
Sybil attack
Wormhole
biblio
Implementation and Analysis of Blackhole Attack in AODV Routing Protocol
Submitted by grigby1 on Wed, 08/02/2017 - 12:41pm
AODV
Blackhole
detection
MANET
manet attack prevention
Packet
pubcrawl
RREP
RREQ
1
2
next ›
last »