Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

log-based anomalies detection

biblio

Visible to the public Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification

Submitted by aekwall on Mon, 06/10/2019 - 10:15am
  • routing procedure
  • multiple malicious nodes
  • passive attacks
  • privacy
  • pubcrawl
  • reasoning rules
  • Resiliency
  • Routing
  • routing phases
  • mobile computing
  • routing security
  • security
  • Syslog
  • telecommunication network routing
  • telecommunication security
  • verification
  • verification phase
  • active attacks
  • mobile ad hoc networks
  • Metrics
  • Merkle hash tree
  • MANETs routing
  • MANETs
  • MANET Attack Detection
  • log-based anomalies detection
  • flow graphs
  • flow graph
  • Diagnostics
  • composability
  • cognition
  • central control program
  • Anomaly Detection
  • Ad hoc networks

Terms of Use  |  ©2023. CPS-VO