Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
A Novel Route Randomization Approach for Moving Target Defense
Submitted by aekwall on Mon, 09/09/2019 - 10:48am
Monitoring
IP networks
software defined networking
moving target defense
Resiliency
pubcrawl
Routing protocols
network topology
control systems
Topology
Scalability
forwarding routes
route randomization
Software Defined Network
Time-frequency Analysis
Predictive Metrics
biblio
RMDD: Cross Layer Attack in Internet of Things
Submitted by grigby1 on Mon, 08/26/2019 - 11:10am
PAN
Throughput
telecommunication network topology
TCP
stealthy attack
single protocol layer
Simultaneous attack
security
RPL
Routing protocols
Routing
Resiliency
resilience
rank manipulation and drop delay cross-layer attack
pubcrawl
6LoWPAN
IPv6
IoT
Internet of Things
intensity attack
intelligent attack
DODAG
DAG
cross-layer
Cross Layer Security
coordinated attack
computer network security
composability
brutal attack
biblio
Optimizing Performance of Anonymity Based Secure Routing Protocol Utilizing Cross Layer Design for Mobile Adhoc Networks
Submitted by grigby1 on Mon, 08/26/2019 - 11:09am
power control
telecommunication security
telecommunication network topology
telecommunication control
SHORT
secure cross layer routing protocol
secure cross layer based power control protocol
SCLPC protocol
SCLPC
Routing protocols
Routing
Resiliency
resilience
pubcrawl
anonymity based Secure routing protocol
optimizing route technique
Mobile adhoc Network
mobile ad hoc networks
MANET
delays
Cryptography
Cross Layer Security
Cross layer designs
Cross layer design
cross layer based designs
composability
anonymous secure routing
biblio
NL-IDS: Trust Based Intrusion Detection System for Network Layer in Wireless Sensor Networks
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
security issues
protocol layers
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
secure path
policy-based governance
security system
sensor node trust
telecommunication security
trust
trust based intrusion detection system
Wireless Sensor Network
wireless sensor networks
WSN
Mathematical model
Black hole attackers
Blackhole attack
collaboration
composability
Conferences
false trust
Intrusion Detection
intrusion detection system
Black hole attack
Measurement
Metrics
mobile ad hoc networks
network intrusion detection
network layer
NL-IDS
periodic trust value
biblio
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
Ad hoc networks
composability
Data models
IDS
MANET
MANET Attack Detection
Metrics
mobile computing
pubcrawl
Resiliency
Route cache
Routing
Routing protocols
Support vector machines
SVM
biblio
Watchdog and Pathrater based Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing table
open nodes
pathrater
pathrater method
Peer-to-peer computing
pubcrawl
Resiliency
Routing
Routing protocols
network topology
security
security of data
Sinkhole attack
telecommunication security
unwanted malicious attacks
Watchdog
watchdog method
Ad-hoc On-demand Distance Vector
mobile radio
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
fake route
effective intrusion detection system
dynamic source routing
computer network security
composability
broad distribution
AODV routing protocol
biblio
ReverseRoute: An Application-Layer Scheme for Detecting Blackholes in MANET Using Mobile Agents
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobility speeds
Throughput
telecommunication security
single nodes
simple application layer based intrusion detection scheme
security attacks
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
multiple blackhole nodes
application-layer scheme
mobile agents
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
lower layers
Intrusion Detection
effective application layer based intrusion detection scheme
detection mechanism
composability
Blackhole attack
biblio
Reputation and trust based selfish node detection system in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobile ad hoc network
trust based selfish node detection system
telecommunication network routing
selfish
Routing protocols
routing layer
Routing
Resiliency
pubcrawl
packet forwarding
node authentication
node
network channel jamming
mobile ad hoc networks
Base stations
misbehavior
Metrics
Measurement
MANETs
MANET Attack Detection
MANET
Load modeling
detection
control systems
Conferences
composability
cellular telephones
biblio
Evaluation of Detection Method to Mitigate DoS Attacks in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
Ad hoc networks
composability
DoS
Filtering
Firewalls (computing)
MANET Attack Detection
MANETs
Metrics
mobile computing
Monitoring
MrDR
pubcrawl
Resiliency
Routing
Routing protocols
biblio
A New Statistical Method for Wormhole Attack Detection in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
number of new neighbors
wormhole attack detection
wormhole attack
wireless sensor networks
Training
telecommunication security
SWAN
statistical methods
security attacks
Routing protocols
Resiliency
pubcrawl
Ad hoc networks
number of neighbors
NS3 simulator
mobile wireless nodes
mobile computing
mobile ad hoc networks
microsoft windows
Metrics
MANET Attack Detection
MANET
delays
composability
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »