Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile adhoc Network
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
biblio
Analysis of Malicious Behavior of Blackhole and Rushing Attack in MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
NS-2
wireless links
telecommunication security
telecommunication network routing
security attacks
security
rushing attack
Rushing
Resiliency
quality of service
QoS metrics
pubcrawl
AODV
network nodes
Mobile adhoc Network
mobile ad hoc networks
Metrics
MANET security
MANET
malicious behavior
Compositionality
Blackhole attack
Blackhole
biblio
Simulation Based Study of Blackhole Attack Under AODV Protocol
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
Ad hoc networks
unauthorized node
target node
open access
Mobile adhoc Network
MANET nodes
Blackhole
AODV
AODV protocol
Blackhole attack
NS-2
mobile computing
Scalability
Throughput
mobile ad hoc networks
MANET
delays
Handheld computers
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
Optimizing Performance of Anonymity Based Secure Routing Protocol Utilizing Cross Layer Design for Mobile Adhoc Networks
Submitted by grigby1 on Mon, 08/26/2019 - 11:09am
power control
telecommunication security
telecommunication network topology
telecommunication control
SHORT
secure cross layer routing protocol
secure cross layer based power control protocol
SCLPC protocol
SCLPC
Routing protocols
Routing
Resiliency
resilience
pubcrawl
anonymity based Secure routing protocol
optimizing route technique
Mobile adhoc Network
mobile ad hoc networks
MANET
delays
Cryptography
Cross Layer Security
Cross layer designs
Cross layer design
cross layer based designs
composability
anonymous secure routing
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
New approach through detection and prevention of wormhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:38pm
mobile computing
wormhole attack
wireless mobile nodes
Victimization
unique wormhole detection and prevention algorithm
tunneling
temporary network topologies
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Aerospace electronics
Mobile communication
Mobile adhoc Network
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
malicious node
Local Area Network consists
full routing method.
electromagnetic radio waves
contagious nodes
Compositionality
attack prevention
arbitrary network topologies