Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
biblio
Partially Predictable Vehicular Ad-hoc Network: Trustworthiness and Security
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
cloud
Trustworthiness Evaluation
secure trustworthiness evaluation based routing protocol
road traffic safety
road traffic efficiency
partially predictable vehicular ad-hoc network
Partially Predictable Network (PPN)
NS2 software
normalized routing overhead
Key-encrypted onion
intelligent communications
hybrid protocol
average end to end delay
road traffic
road safety
Relays
VANET
trustworthiness
packet delivery ratio
vehicular ad hoc networks
Routing
Routing protocols
composability
pubcrawl
Cryptographic Protocols
security
telecommunication security
Big Data
biblio
A Transparent Reordering Robust TCP Proxy To Allow Per-Packet Load Balancing in Core Networks
Submitted by grigby1 on Wed, 12/02/2020 - 1:53pm
TCP end-points
receiver sides
Receivers
resilience
Resiliency
resource allocation
Robustness
Routing protocols
Scalability
pubcrawl
TCP packet reorderings
TCP sender end-hosts
TCP traffic
telecommunication congestion control
telecommunication traffic
Transparent reordering robust TCP proxy
transport protocols
coupled congestion control
Proposals
per-packet load balancing
packet reordering problem
packet level load balancing research
Out of order
ORTA
multiple paths
mobile network providers
low computational complexity
load-balancers
Load management
internet
high bandwidth utilization
fixed network providers
end-to-end transparency
biblio
An Efficient and Reliable Routing Protocol Using Bio-Inspired Techniques for Congestion Control in WSN
Submitted by grigby1 on Wed, 12/02/2020 - 1:51pm
network performance
wireless sensor networks
Wireless Sensor Network
telecommunication congestion control
Scalability
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
Packet loss
AODV protocol
network delay
delays
cuckoo search algorithm
coupled congestion control
congestion recognition
congestion problem
congestion free path
Congestion Control
congested resources
bioinspired techniques
artificial bee colony algorithm.
biblio
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
log entries
anomalies detection
anomalous nodes
black-hole attack
collaborative malicious nodes
DAPV
diagnosing anomalies
direct attacks
distributed verification
expected log information
indirect attacks
abnormal nodes
malicious intermediated routers
MANET routing mechanism
Merkle hash tree
paralyzed nodes
privacy-preserving verification
provenance tracking
routing phase
university campus networks
Wireless Network Security
manet privacy
mobile radio
data privacy
telecommunication security
security
Resiliency
pubcrawl
Routing protocols
privacy
Routing
Peer-to-peer computing
Metrics
security of data
mobile ad hoc networks
Ad hoc networks
mobile computing
single nodes
central control program
cognition
routing phases
routing security
Compositionality
AODV protocol
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
Secure DSR Routing from Malicious Node by PGP Encryption
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
Routing protocols
pubcrawl
Public key
resilience
Resiliency
Route cache
route reply control messages
route request
Routing
PGP
RREP
RREP control message
RREQ
RREQ control message
secure DSR Routing
telecommunication security
UIV
weather RREP
malicious node
Cryptography
data transmission source
demand wireless communication
destination source
Dsr
dynamic source routing
encryption
intermediate node
Compositionality
MANET
manet privacy
MANET reactive routing protocol
Metrics
mobile ad hoc network
mobile ad hoc networks
neighbor nodes
Peer-to-peer computing
biblio
Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 11:58am
mobile nodes
Throughput
threshold-based black hole attack prevention method
telecommunication security
security attack
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile radio
AODV
mobile ad hoc networks
mobile ad hoc network
Metrics
manet privacy
MANET
malicious node
IP networks
fake routing information
data packets
Compositionality
Black hole attack
biblio
Anonymous Routing Protocols in MANETs, a Security Comparative Analysis
Submitted by grigby1 on Thu, 10/29/2020 - 11:58am
mobile ad hoc networks
telecommunication security
special type
self organized fashion
security comparative analysis
Routing protocols
Routing
Resiliency
resilience
pubcrawl
private routing protocols
privacy
performance capabilities
mobile computing
Ad hoc networks
mobile ad hoc network
military environments ones
Metrics
MANETs
manet privacy
MANET
fixed infrastructure
Cryptography
Compositionality
communication secrecy
civil environments ones
anonymous routing protocols
anonymous routing
biblio
Design of Data Confidential and Reliable Bee Clustering Routing Protocol in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 11:57am
reliable Bee clustering routing protocol
mobile ad hoc network
mobile ad hoc networks
multihop routing
packet forwarding ratio
packet forwarding statistics
pattern clustering
pubcrawl
public key cryptography
received packets
Metrics
reliable data transmission
resilience
Resiliency
Routing
Routing protocols
secure data delivery system
sensors
telecommunication security
wireless sensor networks
ECC
Bee Ad Hoc Clustering
bee clustering approach
Bee-Ad Hoc-C
Black hole attack
clustered based approach
Compositionality
data confidential
data privacy
data reliability
overhearing
Elliptic curve cryptography
Elliptical Curve Cryptography
Energy Efficiency
ensures data confidentiality
forwarded packets
IndexTerms-Mobile Ad Hoc Networks
legion intelligence
MANET
manet privacy
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »