Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MANET Attack Mitigation
biblio
An Approach for Black-hole Attack Mitigation in Disruption-tolerant Ad-hoc Smartphone Networks
Submitted by aekwall on Mon, 06/10/2019 - 9:19am
MANET Attack Mitigation
disruption-tolerant networking
black-hole attacks
ad-hoc networks
Metrics
composability
pubcrawl
Resiliency
security
biblio
Augmented DDoS Mitigation with Reputation Scores
Submitted by aekwall on Mon, 06/10/2019 - 9:19am
amplification DDoS
attack mitigation
composability
DDoS attack mitigation
distributed denial of service
Human behavior
MANET Attack Mitigation
Metrics
packet filtering
pubcrawl
reputation score
Resiliency
Security Heuristics
biblio
Countering Control Message Manipulation Attacks on OLSR
Submitted by aekwall on Mon, 06/10/2019 - 9:19am
MANET security
blackhole attacks
composability
MANET Attack Mitigation
MANETs
Metrics
Olsr Routing
pubcrawl
Resiliency
trust computation
biblio
An Attack Scenario and Mitigation Mechanism for Enterprise BYOD Environments
Submitted by aekwall on Mon, 06/10/2019 - 9:17am
attack mitigation
bring your own device (BYOD)
composability
countermeasures
BYOD
data leakage
enterprise networks
Internet of Things (IoT)
MANET Attack Mitigation
Metrics
pubcrawl
Resiliency
rogue access point
security
smartwatch
wi-fi direct printers
biblio
Stellar: Network Attack Mitigation Using Advanced Blackholing
Submitted by aekwall on Mon, 06/10/2019 - 9:17am
BGP
blackholing
composability
DDoS
DDoS attack mitigation
ddos mitigation
Human behavior
IXP
MANET Attack Mitigation
Metrics
pubcrawl
Resiliency
biblio
Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
Submitted by aekwall on Mon, 06/10/2019 - 9:17am
Resiliency
wireless sensor networks
user security
traffic morphing
traffic analysis attack mitigation
telecommunication traffic
telecommunication security
telecommunication network routing
splitting traffic
Smartphones
smartphone sales
smartphone apps
smart phones
security
Routing
Ad hoc networks
Relays
pubcrawl
probability
privacy
multipath routing scheme
mobile computing
mobile ad hoc networks
Metrics
MANET Attack Mitigation
identifying apps
flow routing optimization problem
edge network assistance
data privacy
composability
biblio
Prevention of Timing Attack in Software Defined Named Data Network with VANETs
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
telecommunication network topology
pubcrawl
Resiliency
Safety
Scalability
SDN
Software
Software Defined Network
software defined networking
Software Defined Networks
TAP protocol
Protocols
timing
Timing Attack Prevention protocol
V2I communication
V2V communication
VANET
vehicle to infrastructure communication
vehicle-to-vehicle communication
vehicular
vehicular ad hoc networks
Vehicular Ad-hoc Network
IPv4 addressing problems
attacker vehicles
composability
computer network security
content
data network
Human behavior
Interest
internet
Internet technique
IP networks
attack
MANET
MANET Attack Mitigation
Metrics
mobile computing
named data networking
named data networks
Named Data Network Security
NDN techniques
Peer-to-peer computing
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
Mitigating wormhole attack in MANET using absolute deviation statistical approach
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
MANET Attack Mitigation
wormhole attack mitigation
wormhole attack
Throughput
telecommunication security
telecommunication network routing
Resiliency
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
Metrics
MATLAB simulator
absolute deviation
MANET
fake tunnel
covariance
correlation methods
correlation coefficient
Correlation
composability
Color
AD correlation
absolute deviation statistical approach
absolute deviation correlation coefficient