Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fixed infrastructure
biblio
Anonymous Routing Protocols in MANETs, a Security Comparative Analysis
Submitted by grigby1 on Thu, 10/29/2020 - 11:58am
mobile ad hoc networks
telecommunication security
special type
self organized fashion
security comparative analysis
Routing protocols
Routing
Resiliency
resilience
pubcrawl
private routing protocols
privacy
performance capabilities
mobile computing
Ad hoc networks
mobile ad hoc network
military environments ones
Metrics
MANETs
manet privacy
MANET
fixed infrastructure
Cryptography
Compositionality
communication secrecy
civil environments ones
anonymous routing protocols
anonymous routing
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
cheat nodes
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
artificial immune systems
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
Immune system
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
security of data
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
biblio
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
Submitted by aekwall on Tue, 05/26/2020 - 10:57am
Mobile ad hoc networks (MANETs)
ad hoc nature
AODV protocol
battery power
central authority
dynamic topologies
IEEE 802.11ac protocol
industrial fields
memory space
Blackhole attack
mobile ad-hoc networks
mobility model
multiple Blackhole attack
NS-3 simulator
NS-3.27 simulator
OLSRprotocol
physical protection
single Blackhole attack
network nodes
telecommunication security
network security
Resiliency
pubcrawl
Routing protocols
Routing
mobile radio
delays
Scalability
Relays
wireless LAN
MANET
mobile ad hoc networks
telecommunication network topology
Ad hoc networks
mobile computing
fixed infrastructure
biblio
A Multi-layered Outlier Detection Model for Resource Constraint Hierarchical MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
MANET Attack Detection
security dimensions
resource constraint hierarchical MANET
Resiliency
quality-of-service parameters
quality of service
QoS
pubcrawl
Outliers
outlier minimum improvements
novel multilayered outlier detection algorithm
network performance
multilayered outlier detection model
mobile ad hoc networks
Metrics
ad hoc communication MANET
layered architecture
inliers
high security level
hierarchical similarity metric
hierarchical categorized data
fixed infrastructure
Dynamic Network
distributed network
density-based clustering
decentralized network
Data collection
data analysis
composability
Attack detection