Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
blackhole attacks
biblio
Mitigating Blackhole attack of Underwater Sensor Networks
Submitted by grigby1 on Wed, 03/23/2022 - 11:35am
pubcrawl
resilience
Resiliency
wireless sensor networks
composability
Oceans
Metrics
wireless networks
Clustering algorithms
public key cryptography
Acoustics
sybil attacks
blackhole attacks
prevention of black hole attack
Underwater wireless sensor network
biblio
Routing Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
sparse architectures
radio networks
resilience
Resiliency
route poisoning
Routing
routing around connectivity holes
routing scheme
routing table management
Scalability
software malfunctioning
RACH
telecommunication network management
telecommunication network reliability
telecommunication network routing
telecommunication security
time series
time-series analytics
Wireless communication
wireless network
wireless nodes
wormhole attacks
failure analysis
Blackhole attack
blackhole attacks
Computational modeling
continuous analytical systems
data collection applications
Delay Optimization
delays
dense architectures
dense networks
dynamic information
back testing
historical systems
Internet of Things
IoT networks
IoT routing
Mathematical model
node failures
Path Recovery
Peer-to-peer computing
probability
pubcrawl
biblio
Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
IoT environment
topological isolation
smoothing methods
low power and lossy network
IPv6 routing protocol over LLN
IPv6 over low power personal area network
Internet of things environment
high performance computing environment
forecasting
exponential window function
exponential smoothing time series data
exponential smoothing
blackhole attack detection approach
Blackhole attack
personal area networks
time series
IoT
blackhole attacks
telecommunication network topology
sensors
RFID
sink node
6LoWPAN
internet
Routing
Routing protocols
pubcrawl
Resiliency
Internet of Things
Scalability
IP networks
RPL
biblio
Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
mobile computing
wireless technology
telecommunication security
telecommunication network topology
security challenges
security
Routing protocols
Routing
router
Resiliency
resilience
pubcrawl
mobile nodes
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs Security
MANETs Attacks
MANET topology
MANET security
MANET protocol stack
Compositionality
blackhole attacks
base station
biblio
Countering Control Message Manipulation Attacks on OLSR
Submitted by aekwall on Mon, 06/10/2019 - 10:19am
MANET security
blackhole attacks
composability
MANET Attack Mitigation
MANETs
Metrics
Olsr Routing
pubcrawl
Resiliency
trust computation
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol