Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multiple malicious nodes
biblio
Prevention of DoS Attacks by Detection of Multiple Malicious Nodes in VANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Roads
network throughput
packet delivery ratio
Packet detection
packet detection algorithm
packet loss ratio
pubcrawl
resilience
Resiliency
network availability
Safety
Safety messages
Technology management
VANET
VANETs
vehicle nodes
vehicular ad hoc networks
vehicular adhoc network
driver safety
automation
Compositionality
computer network security
critical information
Denial of Service attacks
detection algorithms
DoS attacks
DoS attacks prevention
manet attack prevention
irrelevant data
irrelevant packets
Jamming
malicious nodes
MANET Attack Detection
Metrics
multiple malicious nodes
biblio
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing procedure
multiple malicious nodes
passive attacks
privacy
pubcrawl
reasoning rules
Resiliency
Routing
routing phases
mobile computing
routing security
security
Syslog
telecommunication network routing
telecommunication security
verification
verification phase
active attacks
mobile ad hoc networks
Metrics
Merkle hash tree
MANETs routing
MANETs
MANET Attack Detection
log-based anomalies detection
flow graphs
flow graph
Diagnostics
composability
cognition
central control program
Anomaly Detection
Ad hoc networks
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes