Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
Elimination of internal attacksfor PUMA in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
multicast protocols
telecommunication security
single sender node
security
Routing protocols
Routing
Resiliency
resilience
receiver nodes
PUMA
pubcrawl
Protocol for Unified Multicasting through Announcements
network resources
multicast routing protocol
communication costs
multicast communication
multicast announcement packet fabrication attack
multicast activity-based overhearing technique
mobile ad hoc networks
Metrics
MANET
MA FabricationAttack
Key exchange
internal attacks
Group communication
fabrication
Conferences
Compositionality
biblio
Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Routing protocols
nods defection
open wireless medium
packet drop rate
packet dropping attack
packet forwarding
pubcrawl
reactive routing protocols
resilience
Resiliency
Routing
nodes unreliability
routing rules
security
self-configuring automatic vehicles
selfish behaviours
Selfish nodes
T-MANET
Tactical MANET
Tactical Mobile Ad-hoc NETworks
telecommunication security
Wireless communication
MANET
attack model
black hole
Compositionality
DSR routing protocol
energy consumption rate
gray hole
high dynamic network architecture
insider threat model
Insider Threats
malicious insider threats
Ad-Hoc Network
Measurement
Metrics
mobile ad hoc network
mobile ad hoc networks
network flow
Network Simulator 2
network throughput
nodes cooperation
nodes misbehavior
biblio
A new anti-jamming reliable routing protocol for tactical MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Routing protocols
neighboring node
node mobility
pubcrawl
Reliability
resilience
Resiliency
Routing
Routing Protocol
neighbor dependency
security
tactical communications
Tactical MANET
Tactical MANETs
telecommunication network reliability
telecommunication security
Wireless communication
Anti-jamming
mobile ad hoc networks
military communication
Metrics
Measurement
MANET
malicious jamming attacks
link stability evaluation
jamming interference
Jamming
Interference
exponential smoothing estimation
data transmission reliability
Compositionality
channel state information
anti-jamming reliable routing protocol
biblio
Intrusion detection systems in MANETs using hybrid techniques
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
RSA algorithm
mobile ad hoc networks
pubcrawl
public key cryptography
resilience
Resiliency
Routing
Routing protocols
RSA
Metrics
security
security of data
self organized wireless technologies
SHA 256 hashing technique
telecommunication security
ZRP
ZRP routing protocol
AES
MANET
intrusion detection system technique
Intrusion Detection
IDS technique
hybrid cryptographic technique
enhanced adaptive acknowledgement
EAACK
data authentication
Cryptography
Cryptographic Protocols
Compositionality
base station
AODV routing protocol
AODV
AES algorithm
biblio
A generic request/reply based algorithm for detection of blackhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Mobile Ad Hoc Network technology
Vulnerability
telecommunication security
Technological innovation
security
RREP packet
Routing protocols
Robustness
Resiliency
resilience
RERR packet
pubcrawl
Monitoring
mobile ad hoc networks
Attack detection
Metrics
MANET nodes
MANET
malicious node
legitimate node
IP networks
generic request/reply
Compositionality
communication policy
collaboration
Blackhole attack
attacks
attackers
biblio
The performance comparison of forwarding mechanism between IPv4 and Named Data Networking (NDN). Case study: A node compromised by the prefix hijack
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
NDN
transport protocols
Topology
telecommunication network routing
Scalability
Routing protocols
Routing Information Base
Routing
Resiliency
resilience
pubcrawl
network topology
network routing
network architecture design
computer network
named data networking
Named Data Network Security
IPv4
IP router
IP networks
IP
Internet Protocol version 4
internet
Human behavior
hijacked node
forwarding plane
data communication
computer network security
biblio
A security-aware routing implementation for dynamic data protection in zone-based MPSoC
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
multiprocessing systems
network on chip security
Zones
security-aware routing
network-on-chip routing
network routing
multiprocessor system-on-chip
MPSoC
Encapsulation
asymmetrical security zones
Firewalls (computing)
Runtime
NoC
Routing protocols
Metrics
resilience
Routing
IP networks
Data protection
network-on-chip
Scalability
Resiliency
pubcrawl
security
biblio
On optimal diversity in network-coding-based routing in wireless networks
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
packet transmissions
wireless sensor networks
wireless networks
Topology
single path routing protocol
Silicon
shortest path routing
Routing protocols
Routing
CTP
optimal diversity
opportunistic routing protocols
ONCR
network-coding-based routing
network coding
greedy algorithms
greedy algorithm
1536086
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »