Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Hybrid Security Method
AODV protocol
AOMDV
AOMDV protocol
AOMDV routing protocol
appropriate routes
Diffie-Hellman algorithm
Diffie-Hellman key exchange algorithm
Distance vector routing protocols
ad hoc network
Normalized Routing Load
on-demand routing protocols
SHA-3 algorithm
single route discovery
useful internet protocol
wireless ad hoc networks
MANET Attack Detection
message passing
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
Routing
computer science
Routing protocols
security
Compositionality
AODV
Black hole attack
MANET
mobile ad hoc networks
detection
mobile ad hoc network
biblio
Anatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Technology management
MANET Attack Detection
security attack
portable hubs
performance measure techniques
Packet loss
network parameters
mobile hubs
mobile ad-hoc network
MANETSs
inactive attack
Dynamic attack
detection anatomization
decentralized validation
security
mobile computing
automation
mobile ad hoc networks
MANETs
Flooding Attacks
Compositionality
Routing protocols
Ad hoc networks
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
Experimental Evaluation of Source Location Privacy Routing Schemes and Energy Consumption Performance
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
source location privacy
Location Privacy in Wireless Networks
route node
relatively lower energy
modified schemes
inversely proportional relationship
guarantee longer network lifetime
Experimental Evaluation
energy consumption performance
dynamic route creation process
control angle
angle-based routing
source location privacy routing schemes
routing schemes
data privacy
sensor node
Compositionality
energy consumption
Metrics
sensor nodes
wireless sensor networks
Wireless Sensor Network
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
An Efficient Location Privacy Scheme for Wireless Multimedia Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 12:01pm
Routing protocols
Location Privacy in Wireless Networks
wireless multimedia sensor networks
unobservability scheme
Source/Sink Location Anonymity
multimedia processing technique
location privacy scheme
Global Attacks
cross-layer design
Contextual Privacy
Image Processing
Multimedia communication
Compositionality
energy consumption
authentication
delays
Intrusion Detection
multipath routing
telecommunication network routing
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data encryption
security
data privacy
Cryptography
authorisation
biblio
Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
Metrics
Location Privacy in Wireless Networks
source-location privacy
dynamic mix-ring
Position measurement
Wireless communications
WSNs
routing algorithm
Compositionality
Heuristic algorithms
statistical analysis
Monitoring
Routing
privacy
wireless sensor networks
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
biblio
Providing Location Privacy Using Fake Sources in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:53am
Routing protocols
Location Privacy in Wireless Networks
source location privacy
resource-constrained sensor nodes
location privacy protection
Global Adversary
context privacy
Position measurement
WSN
Compositionality
computer science
Monitoring
network traffic
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data privacy
biblio
An Efficient Secured Routing Protocol for Software Defined Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:48am
central point coordination
Human Factors
vehicular ad hoc network
Intelligent Transportation Systems
Internet of Vehicles
IoV
cyber physical systems
Routing Protocol
dynamic topology
Software Defined Networks
Energy efficient secured routing protocol
intelligence secure routing
intelligent transport system
network intelligence
RBM
restricted Boltzmann algorithm
software defined Internet of Vehicles
vehicle dynamics
Routing
Internet of Things
security
Software
software defined networking
Resiliency
Human behavior
pubcrawl
Routing protocols
computer network security
telecommunication power management
vehicular ad hoc networks
Metrics
internet
attacks
network lifetime
delays
telecommunication network topology
biblio
Availability as a Metric for Region-Scale Telecommunication Designs
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
pubcrawl
telecommunication network planning
simulation modeling
Security Metrics
Routing protocols
Routing
regional scale networks
region-scale telecommunication designs
queuing theory
qualitative characteristics
availability characteristic
Passive optical networks
network growth process
network availability
Metrics
Measurement
internet
Computing Theory
Communication channels
Buildings
biblio
Cluster based Intrusion Detection System for Mobile Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
mobile ad hoc networks
voting
security of data
Routing protocols
Routing Protocol
route structure
Resiliency
pubcrawl
pattern clustering
node mobility
network traffics
network securities
monitoring process
Monitoring
mobility management (mobile radio)
mobile ad-hoc network
MANET Attack Detection
Metrics
memory overhead
MANET
malicious node
Intrusion Detection
DRINA Intrusion
Compositionality
clustering protocols
cluster based Intrusion detection planning
cluster
CBIDP
ad-hoc node security
Ad Hoc Network Security
active monitoring node
biblio
Performance Analysis of Between Software Defined Wireless Network and Mobile Ad Hoc Network Under DoS Attack
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
SDN structure
network security
Performance analysis
performance criteria
performance values
Resiliency
Routing protocols
SDN
SDN controller
network performance
SDN technology
Software Defined Network
software defined networking
Software Defined wireless Network
traditional network structure
traditional network used today
wireless network technologies
pubcrawl
network interruption
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET structure
MANET routing protocols
MANET
DoS attack
DoS
controller
computer network security
Compositionality
communication technologies
Bandwidth
Ad Hoc Network Security
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »