Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Gray hole attack detection in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
pubcrawl
MD6 security algorithm
Message Digest 5
Metrics
mobile ad hoc networks
mobile ad-hoc network
Mobile communication
mobile computing
networking system
MD5 algorithm
resilience
Resiliency
routing overhead
Routing protocols
self-stabilizing election algorithm
telecommunication network routing
telecommunication security
voting
dynamic cluster head selection
Ad-hoc on demand distance vector protocol
AES security algorithm
Attack detection
batteries
battery power
Clustering algorithms
Compositionality
data transmission rate
Ad hoc networks
dynamic nodes
Election Algorithm
gray hole attack detection
gray hole nodes
identical broadcast range
intrusion detection system
intrusion revealing system
MANET
biblio
Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
resilience
Organizations
packet drop
Peer-to-peer computing
Protocols
pubcrawl
Quality metrics
Re-Routing
rejoining processing
Reliable Path
mobile computing
Resiliency
root nodes
Routing
Routing Protocol
Routing protocols
telecommunication channels
telecommunication network management
telecommunication security
wireless infrastructureless network
GroupKeyManagement
ad hoc environment
Ad hoc networks
Attack detection
authorized nodes
Compositionality
delays
dropped packets
EGSR schemes
group capacity
2ACK scheme
Hybrid based PSO
information transmission
internal attacks
MANET
MANETs
Metrics
mobile ad hoc network
mobile ad hoc networks
biblio
SAODV: Black hole and gray hole attack detection protocol in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:30am
secure AODV protocol
open nature
Peer-to-peer computing
Protocols
pubcrawl
radio links
resilience
Resiliency
SAODV
mobile nature
security attacks
security problem
standards
telecommunication security
Throughput
wireless links
wireless mobile nodes
Ad hoc networks
mobile computing
mobile ad hoc networks
Metrics
MANET
malicious node
gray hole attacks
gray hole attack detection protocol
Gray hole attack
forwarding packets
delays
Cryptographic Protocols
Compositionality
Black hole attack
Attack detection
AODV
biblio
Mobile powered sub-group detection/formation using taste-based collaborative filtering technique
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
pubcrawl
wikipedia discussions
unsupervised approach
Taste-based Similarity MANET
taste-based group
taste-based collaborative filtering technique
sub-group detection performance
Social networking sites
social networking (online)
Social network services
Social Mediadata
social media discussion data
sensors
Resiliency
resilience
Collabarative Filtering
privacy
p2p
Mobile powered sub-group detection/formation
mobile computing
Mobile communication
Metrics
MANET
implicit attitude
Global Positioning System
explicit attitude
debate discussion forum
computer science
Compositionality
collaborative filtering
biblio
A review on VANET security attacks and their countermeasure
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
Resiliency
world VANET
Wireless communication
vehicular ad hoc networks
VANETs wireless communication
VANETs architecture
VANETs
VANET technology
VANET security attacks
V2Vcommunication
telecommunication security
smart cities
security issues
security
Roads
attacks
resilience
pubcrawl
privacy properties
privacy
mobile computing
Metrics
MANETs
MANET
infrastructure communication
ECDSA
DSRC
Cryptography
Compositionality
authentication
biblio
Group signature based privacy protection algorithm for mobile ad hoc network
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
mobile computing
vehicular ad hoc networks
vehicular ad hoc network
Time delay
signature length
short group signature
Resiliency
resilience
pubcrawl
privacy protection issues
privacy protection
privacy
Packet loss rate
network model
anonymous verification
mobile ad hoc network
Metrics
message verification
MANET
group signature based privacy protection algorithm
digital signatures
Data protection
Compositionality
BBS algorithm
Batch verification
automobiles
authentication
biblio
Impact of unreliable positioning in location-based routing protocols for MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
mobile computing
unreliable positioning
tools
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
quality of service
pubcrawl
privacy
positioning error
node scalability
network overhead
network lifetime
Ad hoc networks
mobile ad hoc networks
Metrics
MANET
location-based routing protocols
Energy Efficiency
effective routing
DYMOselfwd
DYMO
Data Security
data privacy
Compositionality
AODV-Line
AODV
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
Proactive secret sharing for long lived MANETs using Elliptic Curve Cryptography
Submitted by grigby1 on Wed, 06/20/2018 - 11:22am
Ad hoc networks
bi-variate polynomial
Compositionality
Elliptic curve cryptography
MANET
Metrics
mobile ad-hoc network
mobile computing
proactive
Protocols
pubcrawl
resilience
Resiliency
secret sharing technique
security
threshold cryptography
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 2:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »