Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad hoc networks
biblio
Hash based efficient secure routing for network communication
Submitted by BrandonB on Wed, 05/06/2015 - 8:55am
mobile computing
WLAN
telecommunication security
security
Routing protocols
Routing Protocol
Routing
power backup
packet transfer
networking
network communication
Mobility
Ad hoc networks
Mobile communication
mobile ad-hoc networks
Mobile Ad-hoc
mobile ad hoc networks
infrastructure wireless networks
hash based efficient secure routing
energy problem
Cryptographic Protocols
autonomous network
authentication
attack
biblio
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:54am
modified credit strategy
tokens renewal
Token
telecommunication security
security
Routing protocols
Routing
Q-factor
Protocols
network layer security protocol
network layer attacks
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
Energy Efficiency
E2-SCAN protocol
CSCAN
credit-based strategy
conditional SCAN
AODV
biblio
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Observers
uncertainty handling
uncertain reasoning
trust management scheme
Trust management
telecommunication security
telecommunication network topology
telecommunication computing
security vulnerabilities
security enhancements
security
Routing
planning (artificial intelligence)
PDR improvement
packet delivery ratio
open wireless medium
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
MANET
indirect observation
end-to-end delay
dynamic topology
DST method
direct observation
Dempster-Shafer Theory
cognition
Bayesian inference
Bayes methods
artificial intelligence community
biblio
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Mean field game
telecommunication security
system resources
strategic security defence decisions
security game model
security enhancements
security
mobile computing
mobile ad hoc networks
mobile ad hoc network (MANET)
mean field game theoretic approach
Ad hoc networks
mathematical tool
Mathematical model
MANETs
Games
game theory
fully distributed scheme
Equations
centralized administration
Approximation methods
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs
Submitted by BrandonB on Tue, 05/05/2015 - 11:18am
moving target defense mechanism
Wireless communication
telecommunication network reliability
tactical cognitive radio MANET
source selective jamming attack combation
source selective jammer block transmission
source MAC address
secure communication
seamless communication
reliable communication
random address assignment
probability
parameter selection
Ad hoc networks
mobile computing
mobile ad hoc networks
military communication
Jamming
interference suppression
flipped address mechanism
delays
computer network security
Communication system security
cognitive radio
address manipulation
biblio
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:28am
mobile agents
WSN
wireless sensor networks
Wireless Sensor Network
Unified modeling language
telecommunication security
security
research issues
Monitoring
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
MANET
Intrusion Detection Systems
Intrusion Detection
IDS guidelines
IDS
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 2:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »