Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Black hole attacks
biblio
Detection and Prevention of Black Hole Attack in SUPERMAN
Submitted by aekwall on Tue, 03/09/2021 - 12:39pm
manet attack prevention
Ad hoc networks
Black hole attacks
MANET Attack Detection
mobile computing
pubcrawl
Resiliency
Routing
Routing protocols
Scalability
security
Telecommunications
wireless networks
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
protocol selection
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
cognitive radio
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
radio networks
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
Scalability
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
biblio
Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
mobile ad hoc networks
trust-based routing scheme
trust-based routing
telecommunication security
Scalability
Routing protocols
Routing Protocol
routing environment
Routing
Resiliency
reactive protocol
pubcrawl
packet delivery ratio
node data transfer mechanism
mobile nodes
Trust Routing
mobile ad hoc network
MANET
Energy states
data transaction
data retrieval
data packet
black-hole attack
Black hole attacks
Black hole attack
Attacker node
and trust-based scheme
Ad-hoc On-demand Distance Vector
Ad-doc On-Demand Distance Vector (AODV) protocol
biblio
Analysis of Different Black Hole Attack Detection Mechanisms for AODV Routing Protocol in Robotics Mobile AdHoc Networks
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
Resiliency
telecommunication security
security attacks
Scalability
Routing protocols
Routing attack
router
route disclosure procedure
robotics mobile ad-hoc networks
Robotics MANETs
robotics MANET environment
MANET Attack Detection
removal mechanisms
pubcrawl
mobile ad hoc networks
malicious station attack
Black hole attacks
black hole attack detection mechanisms
BH finding
BH attack
AODV routing protocol
Ad-hoc On-demand Distance Vector
biblio
Security methods against Black Hole attacks in Vehicular Ad-Hoc Network
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
security
Scalability
Resiliency
pubcrawl
Routing
vehicular ad hoc networks
Communication system security
Routing protocols
Intrusion Detection
Heuristic algorithms
Black hole attacks
black hole
Vehicular Ad-hoc Network
biblio
A Review on Prevention and Detection Schemes for Black Hole Attacks in MANET
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
mobile ad hoc network
telecommunication security
telecommunication network topology
Scalability
Routing protocols
Routing
Resiliency
quality of service
pubcrawl
Performance Metrics
mobile ad hoc networks
manet attack prevention
MANET
delays
collaboration
changing topology
Black hole attacks
black hole attack prevention
black hole attack detection
Black hole attack
ad hoc network
biblio
Solutions to Black Hole Attacks in MANETs
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
mobile computing
ZRP
self-organising networks
original routing protocol
numerous routing protocols
importance each day
black hole attack solutions
Black hole attacks
OLSR
Dsr
AODV
black holes
Black hole attack
Energy Efficiency
security
Ad hoc networks
Throughput
mobile ad hoc networks
MANET
testing
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
Scalability
RPL
biblio
Mitigation Technique for Black hole Attack in Mobile Ad hoc Network
Submitted by aekwall on Tue, 03/09/2021 - 12:36pm
mobile ad hoc networks
Random Mobility
network scenario
Gray hole attack
device communication
Black hole attacks
Black hole attack
mitigation technique
mobile ad hoc network
Throughput
Scalability
quality of service
delays
Routing protocols
Wireless communication
Routing
pubcrawl
Resiliency
telecommunication security
biblio
Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)
Submitted by aekwall on Tue, 03/09/2021 - 12:36pm
Packet loss
ns2
normal network conditions
largest remaining energy
flooding attack AODV routing protocol
Flooding Attack
energy-efficient AODV
energy parameters
different network conditions
Black hole attacks
Vehicular Ad-hoc Network
Performance analysis
wireless technology
Black hole attack
Energy
AODV
Scalability
data communication
Blackhole attack
Throughput
VANET
quality of service
delays
Energy Efficiency
Wireless communication
vehicular ad hoc networks
malicious nodes
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
1
2
next ›
last »