Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Watchdog

biblio

Visible to the public Watchdog and Pathrater based Intrusion Detection System for MANET

Submitted by aekwall on Mon, 06/10/2019 - 10:15am
  • routing table
  • open nodes
  • pathrater
  • pathrater method
  • Peer-to-peer computing
  • pubcrawl
  • Resiliency
  • Routing
  • Routing protocols
  • network topology
  • security
  • security of data
  • Sinkhole attack
  • telecommunication security
  • unwanted malicious attacks
  • Watchdog
  • watchdog method
  • Ad-hoc On-demand Distance Vector
  • mobile radio
  • mobile ad hoc networks
  • mobile ad hoc network
  • Metrics
  • MANET Attack Detection
  • MANET
  • malicious nodes
  • intrusion detection system
  • fake route
  • effective intrusion detection system
  • dynamic source routing
  • computer network security
  • composability
  • broad distribution
  • AODV routing protocol
biblio

Visible to the public Merkle-Hellman knapsack-side channel monitoring based secure scheme for detecting provenance forgery and selfish nodes in wireless sensor networks

Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
  • Metrics
  • Watchdog
  • side channel monitoring
  • Selfish nodes
  • Resiliency
  • Public key
  • pubcrawl
  • Provenance forgery
  • Provenance
  • Monitoring
  • Bloom filter
  • Merkle-Hellman knapsack algorithm
  • Human Factors
  • Human behavior
  • encryption
  • encoding
  • Compositionality
  • composability
  • Ciphers

Terms of Use  |  ©2023. CPS-VO