Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad hoc networks
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
Ad hoc networks
composability
Data models
IDS
MANET
MANET Attack Detection
Metrics
mobile computing
pubcrawl
Resiliency
Route cache
Routing
Routing protocols
Support vector machines
SVM
biblio
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing procedure
multiple malicious nodes
passive attacks
privacy
pubcrawl
reasoning rules
Resiliency
Routing
routing phases
mobile computing
routing security
security
Syslog
telecommunication network routing
telecommunication security
verification
verification phase
active attacks
mobile ad hoc networks
Metrics
Merkle hash tree
MANETs routing
MANETs
MANET Attack Detection
log-based anomalies detection
flow graphs
flow graph
Diagnostics
composability
cognition
central control program
Anomaly Detection
Ad hoc networks
biblio
Evaluation of Detection Method to Mitigate DoS Attacks in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
Ad hoc networks
composability
DoS
Filtering
Firewalls (computing)
MANET Attack Detection
MANETs
Metrics
mobile computing
Monitoring
MrDR
pubcrawl
Resiliency
Routing
Routing protocols
biblio
A New Statistical Method for Wormhole Attack Detection in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
number of new neighbors
wormhole attack detection
wormhole attack
wireless sensor networks
Training
telecommunication security
SWAN
statistical methods
security attacks
Routing protocols
Resiliency
pubcrawl
Ad hoc networks
number of neighbors
NS3 simulator
mobile wireless nodes
mobile computing
mobile ad hoc networks
microsoft windows
Metrics
MANET Attack Detection
MANET
delays
composability
biblio
Establishing Trust by Detecting Malicious Nodes in Delay Tolerant Network
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
selfish behavior
Probabilistic logic
probabilistic misbehavior detection scheme
probability
pubcrawl
Punishment
Resiliency
Routing
Scalability
probabilistic checking
Selfish node
Task Analysis
telecommunication network routing
telecommunication security
trust
Trust Routing
trusted authority
Trusted Computing
game theory analysis
compensation
composability
Conferences
delay tolerant network
delay tolerant networks
DTN
dynamic probabilistic inspection
game theory
Ad hoc networks
History
Inspection
malicious nodes
Market research
MAXTRUST scheme
Misbehavior detection
misbehavior nodes
mobile radio
biblio
Game Theoretical Approach with Audit Based Misbehavior Detection System
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
mobile ad-hoc networks
dynamically shifting nodes
end-to-end encrypted traffic
GAMD
game theoretical approach
incentive based reputation scheme
incentive schemes
MANET environment
misbehaving nodes
misbehavior nodes
continuous packet droppers
multichannel networks
multihop ad hoc networks
node behavior
per-packet basis
selective dropping attacks
selective packet droppers
Selfish node
supervisory game
theoretical cryptography
Routing protocols
Monitoring
pubcrawl
composability
Conferences
game theory
Ad hoc networks
telecommunication security
Peer-to-peer computing
Routing
Games
Cryptography
Compositionality
MANET
mobile ad hoc networks
mobile nodes
AMD
Audit based Misbehavior Detection system
Audit-based Misbehavior Detection
biblio
Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
AEGIS-128
theoretical cryptography
vanilla RMFA
theoretical round modification fault analysis
theoretical level
Round modification
Fault attack
Ciphers
authenticated encryption
algebraic techniques
Algebraic Fault Analysis
AEGIS-256
authentication
AEGIS
advanced round modification fault analysis
advanced fault analysis
Compositionality
Circuit faults
Cryptography
encryption
Ad hoc networks
composability
pubcrawl
biblio
Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
school campus networks
packet transmission
participating nodes
Peer-to-peer computing
pubcrawl
resilience
Routing
routing nodes
Routing Protocol
Routing protocols
packet delivery ratio
service coverage
telecommunication security
transmitted data packets
ubiquitous wireless networks
wireless mesh network
wireless mesh networks
wireless sensor networks
WMNs
influential factors
AODV
black hole
Black hole attack
community networking
composability
emergency rescue operations
home automation
IEEE 802.11 Standard
Ad hoc networks
Malicious Packet Drop
malicious packet drop attack
Metrics
multihop destination
network maintenance
network performance reliability
NS-3 simulator
office automation
biblio
Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
Internet of battlefield things
wireless networks
war scenarios
telecommunication security
sensors
Scalability
Resiliency
resilience
pubcrawl
Poisson point process
mission-critical data
military communication
iobt
Internet of Things
Ad hoc networks
information dissemination
Human Factors
Geometry
Epidemics
Decision Making
critical information dissemination
coordinated decision-making
Computational modeling
combat efficiency
Biological system modeling
Battlefield
Analytical models
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »