Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data packets
biblio
Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 10:58am
AODV
Black hole attack
Compositionality
data packets
fake routing information
IP networks
malicious node
MANET
manet privacy
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile nodes
mobile radio
pubcrawl
resilience
Resiliency
Routing
Routing protocols
security
security attack
telecommunication security
threshold-based black hole attack prevention method
Throughput
biblio
Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes
Submitted by grigby1 on Thu, 07/16/2020 - 11:17am
composability
Compositionality
computer network security
covert channels
covert timing channel
data packets
feature extraction
hidden data
information security
learning (artificial intelligence)
Linux
machine learning
machine learning methods
network steganography
Protocols
pubcrawl
resilience
Resiliency
Scalability
TCPIP
telecommunication channels
timing
Vectors
window sizes
biblio
An Identity Privacy Protection Strategy in Vehicle Named Data Network
Submitted by grigby1 on Fri, 05/29/2020 - 2:53pm
anonymity
computer network security
data names
data packets
data privacy
data provider
data requester
digital signatures
Human behavior
identity information
identity privacy protection strategy
Identity Security
interest packages
internet
malicious nodes
Named Data Network Security
ONE-based VNDN platform
privacy problems
privacy protection
pubcrawl
resilience
Resiliency
ring signature scheme
Scalability
Security analysis
vehicle named data network
vehicle opportunity network
vehicular ad hoc networks
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 3:15pm
BHR
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
Hardware
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
multiprocessing systems
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
Resiliency
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
biblio
Trust Based Certificate Revocation and Attacks in MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
Ad hoc networks
attacks
blackhole attacker
Certificate Revocation
clustering
Compositionality
Conferences
data packets
enhanced certificate revocation scheme
MANET
MANET security
Metrics
mobile ad hoc networks
mobile ad-hoc network security
mobile computing
pubcrawl
resilience
Resiliency
Routing
Routing protocols
security
telecommunication security
vector-based trust mechanism
biblio
Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 9:14am
black hole
composability
data packets
defense mechanism
gray hole
IDS
Intrusion Detection
intrusion detection system
malicious nodes
MANET
MANET Attack Detection
Metrics
mobile ad hoc networks
mobile ad-hoc network
notice participation
packet delivery ratio
pubcrawl
Resiliency
Routing
routing attacks
Routing protocols
single malicious node
telecommunication network routing
telecommunication security
Throughput
trust relationship
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
AODV
attack mitigation
black-hole attack mitigation techniques
Blackhole
byzantine attacks
clustering
Compositionality
Conferences
cross checking
data packets
delays
destination nodes
high destination sequence number
IDS
MANET
Metrics
mobile ad hoc networks
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
Resiliency
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
Ad hoc networks
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
clustering direction
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
malicious nodes
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
pubcrawl
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
biblio
Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET
Submitted by K_Hooper on Wed, 05/09/2018 - 10:03am
Cooperative Gray Hole attack
data packets
gray hole attack prevention
intermediate nodes
malicious node
MANET
meta heuristic
mobile ad hoc networks
mobile ad-hoc network
Mobile Ad-Hoc Network (MANET)
Mobile communication
mobile computing
mobile nodes
multiple gray hole attack
network simulator
particle swarm optimisation
particle swarm optimization
pubcrawl
Resiliency
Scalability
Security Heuristics
telecommunication security
wireless movable nodes
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
android
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
encryption
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
mobile ad hoc networks
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
1
2
next ›
last »