Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET Attack Detection
biblio
Intrusion Detection in VANETs
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Attacks on VANET
Compositionality
computer architecture
IDS
Intrusion Detection
intrusion detection system
MANET Attack Detection
Metrics
pubcrawl
Reliability
Resiliency
security
Training data
VANET Security
vehicular ad hoc networks
wireless networks
biblio
A Survey on Intrusion Detection System in Ad Hoc Networks Based on Machine Learning
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Industries
MANET Attack Detection
Traffic
Network
intrusion
detection
ANN
telecommunication traffic
WSN
MANET
Compositionality
Logic gates
Resiliency
Metrics
pubcrawl
Wireless communication
SDN
machine learning
Intrusion Detection
wireless sensor networks
Monitoring
biblio
New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Intrusion Detection System (IDS)
MANET Attack Detection
mobile ad hoc network
Naive Bayes
support vector machine
Random Forest
random forests
Radio frequency
network intrusion detection
Support vector machines
Routing protocols
Compositionality
Resiliency
Metrics
pubcrawl
machine learning
Training
Routing
biblio
Machine Learning and Data Mining in Cybersecurty
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
machine learning
MANET Attack Detection
Intrusion Detection Systems
Cybersecurty Machine learning
ad hoc network
Data mining
Classification algorithms
MANET
Compositionality
Support vector machines
Resiliency
Metrics
pubcrawl
Wireless communication
machine learning algorithms
Training
Intrusion Detection
biblio
To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
Compositionality
mobile computing
Monitoring
pubcrawl
Routing
Routing protocols
manet attack prevention
Resiliency
Metrics
mobile ad hoc networks
AODV
AODV protocol
Black hole attack
data transfer
Detection and Prevention.
MANET
MANET Attack Detection
biblio
Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM)
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
MANET
MANET Attack Detection
HCIDM
Cluster Routing
CCIDM
trust
wireless networks
mobile computing
Ad hoc networks
collaboration
Compositionality
Resiliency
Metrics
pubcrawl
Routing
Intrusion Detection
Clustering algorithms
biblio
Detection Jellyfish Attacks Against Dymo Routing Protocol on Manet Using Delay Per-Hop Indicator (Delphi) Method
Submitted by aekwall on Mon, 02/07/2022 - 5:08pm
delays
Routing
information technology
Wireless communication
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
mobile computing
Routing protocols
DELPHI
DYMO
Jellyfish
MANET Attack Detection
biblio
Detection and Prevention of Blackhole Attack in AODV of MANET
Submitted by aekwall on Mon, 02/07/2022 - 5:08pm
clustering
manet attack prevention
Resiliency
Metrics
Compositionality
AODV
Black hole attack
Routing protocols
Topology
Routing
Conferences
MANET
MANET Attack Detection
mechatronics
mobile nodes
network topology
Partitioning algorithms
pubcrawl
biblio
Detection and Prevention of Blackhole Node
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
mobile computing
Topology
Throughput
Routing protocols
Routing
Resiliency
resilience
R-AODV
pubcrawl
Packet drop ratio (PDR)
NS-2.35
manet attack prevention
Metrics
MANET Attack Detection
end-to-end delay
encryption
Elliptic curve cryptography
ECC
Compositionality
Blackhole attack
Ad hoc networks
biblio
A Time Interval Based Blockchain Model for Detection of Malicious Nodes in MANET Using Network Block Monitoring Node
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
Block Analysis
Compositionality
Conferences
data communication
malicious node detection
MANET Attack Detection
Metrics
mobile ad hoc networks
Monitoring
Network Block Monitoring Node
pubcrawl
resilience
Resiliency
Routing
routing table
Time Interval Based Blockchain Model
1
2
3
4
next ›
last »