Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
routing table
biblio
A Time Interval Based Blockchain Model for Detection of Malicious Nodes in MANET Using Network Block Monitoring Node
Submitted by grigby1 on Tue, 09/21/2021 - 2:35pm
Block Analysis
Compositionality
Conferences
data communication
malicious node detection
MANET Attack Detection
Metrics
mobile ad hoc networks
Monitoring
Network Block Monitoring Node
pubcrawl
resilience
Resiliency
Routing
routing table
Time Interval Based Blockchain Model
biblio
Efficient Route Identification Method for Secure Packets Transfer in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
regular node mobility
mobile nodes
MANET security
efficient route identification method
fundamental system convenience
malicious nodes
MANET routing Methods
mobile ad hoc network routing
novel secure routing method
Power demand
route discovery process
route selection
route topology
routing table
routing table info
routing technique
secure packets transfer
secured route identification
telecommunication network routing
telecommunication security
security
remote system
Resiliency
pubcrawl
Routing
trusted nodes
Metrics
Conferences
network topology
Topology
secure data transmission
MANET
mobile ad hoc networks
telecommunication network topology
energy consumption
Compositionality
biblio
Logical Topology of Networks Implementing IPv6 Addressing
Submitted by grigby1 on Tue, 01/21/2020 - 11:08am
collaboration
composability
IPv6
ipv6 security
ISP
logical
Metrics
Network
policy-based governance
pubcrawl
resilience
Resiliency
routing table
the pythagoras tree
Topology
biblio
Watchdog and Pathrater based Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 9:15am
routing table
open nodes
pathrater
pathrater method
Peer-to-peer computing
pubcrawl
Resiliency
Routing
Routing protocols
network topology
security
security of data
Sinkhole attack
telecommunication security
unwanted malicious attacks
Watchdog
watchdog method
Ad-hoc On-demand Distance Vector
mobile radio
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
fake route
effective intrusion detection system
dynamic source routing
computer network security
composability
broad distribution
AODV routing protocol
biblio
Attacks and mitigation techniques on mobile ad hoc network \#x2014; A survey
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
mobile ad hoc networking
ubiquitous computing
telecommunication network routing
Sybil attack
routing table
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
attack mitigation
mobile ad hoc network
mitigation techniques
military search operations
military rescue operations
Metrics
Market research
MANET
Compositionality
civilian environment
attacks techniques
attacks in manet
biblio
Flooding attack detection and prevention in MANET based on cross layer link quality assessment
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
link layer assessment based flooding attack detection
Topology
telecommunication security
telecommunication network routing
routing table
Routing
Resiliency
resilience
pubcrawl
network topology
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
accurate flooding attack detection
flooding node detection
Flooding Attack
Distributed Denial of Services attack
DDoS Attack
DDoS
cross layer MAC-Network interface
cross layer link quality assessment
Cross layer design
Cross Layer
Computer crime
Compositionality
Attack detection
biblio
Machine learning aided traffic tolerance to improve resilience for software defined networks
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
SDN
OpenFlow
pattern classification
POX controller platform
Prediction algorithms
pubcrawl
real-time systems
ReSDN
resilience
resilience framework
Resiliency
routing table
network security
SDNs
software defined networking
Software Defined Networks
Survivability
SYN flood
telecommunication network routing
telecommunication traffic
Traffic Management
traffic tolerance
Training
feature extraction
centralised control
centralised controller
composability
computer network management
computer network reliability
computer network security
Decision Making
DoS attack
DoS attacks
Engines
attacks classification
flexible management
Future Internet
intrusion tolerance
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious intrusion detection
Mininet simulator
MIT KDD 1999 dataset
neptune attack