Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Prevention of Rushing Attack in AOMDV using Random Route Selection Technique in Mobile Ad-hoc Network
Submitted by aekwall on Tue, 02/22/2022 - 2:11pm
Simulation Network (NS2)
Metrics
mobile nodes
pubcrawl
Random route selection
Resiliency
Routing protocols
rushing attack
security
Measurement
Throughput
time threshold value Technique
wireless networks
AOMDV
Compositionality
delays
MANET
manet attack prevention
biblio
Extending Routes in Tor to Achieve Recipient Anonymity against the Global Adversary
Submitted by grigby1 on Wed, 02/09/2022 - 2:49pm
Numerical models
anonymity
anonymous routing
Censorship resistance
composability
Costs
encryption
Human behavior
Metrics
Topology
overlay networks
privacy
pubcrawl
resilience
Resiliency
Routing
Routing protocols
biblio
WIP: An Onion-Based Routing Protocol Strengthening Anonymity
Submitted by grigby1 on Wed, 02/09/2022 - 2:46pm
Onion
Analytical models
anonymity
Anonymous Communication Networks
composability
Global Adversary Model
Human behavior
Metrics
Multimedia communication
Wireless communication
overlay networks
privacy
pubcrawl
resilience
Resiliency
Routing
Routing protocols
timing
biblio
Secure Routing Protocols for MANET-enabled IoT
Submitted by grigby1 on Tue, 02/08/2022 - 11:47am
Wireless communication
MANET security
MANET
AODV
Routing protocols
Compositionality
sensors
Routing
composability
Internet of Things
wireless sensor networks
Cryptography
Resiliency
resilience
Metrics
pubcrawl
IoT
security
biblio
Performance Analysis of Blackhole and Wormhole Attack in MANET Based IoT
Submitted by grigby1 on Tue, 02/08/2022 - 11:47am
Measurement
MANET security
ns-3
MANET-IoT
AODV
wormhole attack
Routing protocols
Blackhole attack
Compositionality
Reliability
Internet of Things
delays
composability
Throughput
Resiliency
resilience
Metrics
pubcrawl
security
biblio
New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Intrusion Detection System (IDS)
MANET Attack Detection
mobile ad hoc network
Naive Bayes
support vector machine
Random Forest
random forests
Radio frequency
network intrusion detection
Support vector machines
Routing protocols
Compositionality
Resiliency
Metrics
pubcrawl
machine learning
Training
Routing
biblio
To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
Compositionality
mobile computing
Monitoring
pubcrawl
Routing
Routing protocols
manet attack prevention
Resiliency
Metrics
mobile ad hoc networks
AODV
AODV protocol
Black hole attack
data transfer
Detection and Prevention.
MANET
MANET Attack Detection
biblio
Detection Jellyfish Attacks Against Dymo Routing Protocol on Manet Using Delay Per-Hop Indicator (Delphi) Method
Submitted by aekwall on Mon, 02/07/2022 - 5:08pm
delays
Routing
information technology
Wireless communication
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
mobile computing
Routing protocols
DELPHI
DYMO
Jellyfish
MANET Attack Detection
biblio
Detection and Prevention of Blackhole Attack in AODV of MANET
Submitted by aekwall on Mon, 02/07/2022 - 5:08pm
clustering
manet attack prevention
Resiliency
Metrics
Compositionality
AODV
Black hole attack
Routing protocols
Topology
Routing
Conferences
MANET
MANET Attack Detection
mechatronics
mobile nodes
network topology
Partitioning algorithms
pubcrawl
biblio
Secure Key Management Scheme With Good Resiliency For Hierarchical Network Using Combinatorial Theory
Submitted by aekwall on Fri, 02/04/2022 - 10:36am
wireless sensor networks
Base stations
Wireless communication
pubcrawl
Routing protocols
Resistance
Buildings
key management
Reliability engineering
Resiliency
BIBD
combinatorial design
Key Distribution
key refreshment
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »