Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
manet attack prevention
biblio
Prevention of Rushing Attack in AOMDV using Random Route Selection Technique in Mobile Ad-hoc Network
Submitted by aekwall on Tue, 02/22/2022 - 1:11pm
Simulation Network (NS2)
Metrics
mobile nodes
pubcrawl
Random route selection
Resiliency
Routing protocols
rushing attack
security
Measurement
Throughput
time threshold value Technique
wireless networks
AOMDV
Compositionality
delays
MANET
manet attack prevention
biblio
To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network
Submitted by aekwall on Mon, 02/07/2022 - 4:09pm
Compositionality
mobile computing
Monitoring
pubcrawl
Routing
Routing protocols
manet attack prevention
Resiliency
Metrics
mobile ad hoc networks
AODV
AODV protocol
Black hole attack
data transfer
Detection and Prevention.
MANET
MANET Attack Detection
biblio
Detection and Prevention of Blackhole Attack in AODV of MANET
Submitted by aekwall on Mon, 02/07/2022 - 4:08pm
clustering
manet attack prevention
Resiliency
Metrics
Compositionality
AODV
Black hole attack
Routing protocols
Topology
Routing
Conferences
MANET
MANET Attack Detection
mechatronics
mobile nodes
network topology
Partitioning algorithms
pubcrawl
biblio
Black Hole Attack in Mobile Ad Hoc Network and its Avoidance
Submitted by aekwall on Mon, 12/20/2021 - 11:19am
wireless networks
Routing protocols
Routing
pubcrawl
mobile nodes
mobile ad hoc networks
MANET – Mobile Ad Hoc Network
DSSR – Destination Sequence Routing
DSR – Dynamic Source Routing
DoS – Denial of Service
AODV – On Demand Distance Vector Routing
Ad Hoc Network Security
Compositionality
Metrics
Resiliency
manet attack prevention
biblio
Comparative Analysis of Various Approaches for DoS Attack Detection in VANETs
Submitted by grigby1 on Tue, 09/21/2021 - 2:38pm
manet attack prevention
Attacked Packet Detection Algorithm
Bandwidth
Best Response
Compositionality
Computer crime
detection algorithms
game theory
Metrics
pubcrawl
resilience
Resiliency
Roads
Safety
vehicular ad hoc networks
biblio
Detection and Prevention of Blackhole Node
Submitted by grigby1 on Tue, 09/21/2021 - 2:35pm
mobile computing
Topology
Throughput
Routing protocols
Routing
Resiliency
resilience
R-AODV
pubcrawl
Packet drop ratio (PDR)
NS-2.35
manet attack prevention
Metrics
MANET Attack Detection
end-to-end delay
encryption
Elliptic curve cryptography
ECC
Compositionality
Blackhole attack
Ad hoc networks
biblio
Multi-Attack Detection Using Forensics and Neural Network Based Prevention for Secure MANETs
Submitted by grigby1 on Tue, 09/21/2021 - 2:35pm
MANET Attack Detection
telecommunication traffic
Routing
Resiliency
resilience
pubcrawl
Probes
neural network
Multi attacker
Metrics
manet attack prevention
MANET
IEEE 802.11 Standard
Fuzzy logic
Forensics
Forensic method
Ethernet
detection
delays
Compositionality
biblio
Blackhole Attack Cooperative Prevention Method in MANETs
Submitted by aekwall on Mon, 08/02/2021 - 2:13pm
manet attack prevention
Ad hoc networks
AODV
Blackhole
Compositionality
Conferences
MANET
MANET security
Metrics
mobile computing
Proposals
pubcrawl
Resiliency
Routing
Routing protocols
security
biblio
Direct Trust-based Detection Algorithm for Preventing Jellyfish Attack in MANET
Submitted by aekwall on Mon, 08/02/2021 - 2:11pm
MANET Attack Detection
wireless sensor networks
Throughput
security
Resiliency
pubcrawl
mobile ad hoc networks
Metrics
MANET security
manet attack prevention
MANET
Jellyfish Attack
Direct Trust based Detection.
delays
cyber security
Conferences
Compositionality
Aerospace electronics
biblio
Detection and Prevention of Black Hole Attack in SUPERMAN
Submitted by aekwall on Tue, 03/09/2021 - 11:39am
manet attack prevention
Ad hoc networks
Black hole attacks
MANET Attack Detection
mobile computing
pubcrawl
Resiliency
Routing
Routing protocols
Scalability
security
Telecommunications
wireless networks
1
2
3
next ›
last »