Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
Ad hoc networks
composability
Data models
IDS
MANET
MANET Attack Detection
Metrics
mobile computing
pubcrawl
Resiliency
Route cache
Routing
Routing protocols
Support vector machines
SVM
biblio
Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
mobile computing
Wormhole tunnel
wormhole attack detection
wireless medium
Wireless communication
telecommunication security
telecommunication network routing
Routing
Resiliency
pubcrawl
network level
Communication system security
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
graph theory
Extremities
end-nodes
composability
biblio
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing procedure
multiple malicious nodes
passive attacks
privacy
pubcrawl
reasoning rules
Resiliency
Routing
routing phases
mobile computing
routing security
security
Syslog
telecommunication network routing
telecommunication security
verification
verification phase
active attacks
mobile ad hoc networks
Metrics
Merkle hash tree
MANETs routing
MANETs
MANET Attack Detection
log-based anomalies detection
flow graphs
flow graph
Diagnostics
composability
cognition
central control program
Anomaly Detection
Ad hoc networks
biblio
Evaluation of Detection Method to Mitigate DoS Attacks in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
Ad hoc networks
composability
DoS
Filtering
Firewalls (computing)
MANET Attack Detection
MANETs
Metrics
mobile computing
Monitoring
MrDR
pubcrawl
Resiliency
Routing
Routing protocols
biblio
A New Statistical Method for Wormhole Attack Detection in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
number of new neighbors
wormhole attack detection
wormhole attack
wireless sensor networks
Training
telecommunication security
SWAN
statistical methods
security attacks
Routing protocols
Resiliency
pubcrawl
Ad hoc networks
number of neighbors
NS3 simulator
mobile wireless nodes
mobile computing
mobile ad hoc networks
microsoft windows
Metrics
MANET Attack Detection
MANET
delays
composability
biblio
Extracting the Security Features Implemented in a Bluetooth LE Connection
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Data mining
bluetooth security
Frontline BPA Low Energy Analyzer
Bluetooth special interest group
Bluetooth Smart
bluetooth low energy
Bluetooth LE security
Bluetooth LE devices
Bluetooth LE connection
Bluetooth devices
Bluetooth
computer network security
smart phones
composability
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
Protocols
encryption
biblio
A security architecture of VANET based on blockchain and mobile edge computing
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
Network Security Architecture
Vehicular Ad-hoc Network
vehicular ad hoc networks
VANET data
VANET
trusted central entity
service layer
security of data
security architecture
security
Resiliency
pubcrawl
perception layer
blockchain
Mobile Edge Computing
mobile computing
edge computing layer
edge computing
edge cloud services
Distributed databases
Data Security
computer architecture
Cloud Computing
blockchain technology
blockchain security
biblio
Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
smart phones
privacy
privacy health
pubcrawl
publicly available factors
risky apps
security
security assessment
security of data
potentially sensitive data
tools
transparent trustworthiness score
trust
Trust4App framework
Trusted Computing
trustworthiness
trustworthiness indicators
user reviews
Google
Apple App store
application marketplaces
automatic trustworthiness frameworks
automating trustworthiness assessment
composability
comprehensive trustworthiness assessment
Data collection
data privacy
actionable trustworthiness assessment
Google Play store
holistic personalized trustworthiness score
intuitive trustworthiness assessment
malicious developers
malware
Mobile Applications
mobile computing
Mobile Security
biblio
Trust-aware routing protocol for mobile crowdsensing environments
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
sensor lifetime
MCS
Measurement
mobile crowdsensing environments
multi-metric decision
network lifetime
optimal routing decision
packet delivery ratio
residual energy
link quality node selection
Signal to noise ratio
sink node
social behaviour
suboptimal data forwarding
Trust management
trust-aware routing protocol
Trust Routing
Scalability
link quality
Fuzzy logic
friendship mechanism
FR solution
Energy Efficiency
telecommunication power management
Routing
energy conservation
wireless sensor networks
Routing protocols
composability
pubcrawl
Resiliency
mobile computing
Conferences
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »