Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
MANET Attack Mitigation
biblio
An Approach for Black-hole Attack Mitigation in Disruption-tolerant Ad-hoc Smartphone Networks
Submitted by
aekwall
on Mon, 06/10/2019 - 9:19am
MANET Attack Mitigation
disruption-tolerant networking
black-hole attacks
ad-hoc networks
Metrics
composability
pubcrawl
Resiliency
security
biblio
Augmented DDoS Mitigation with Reputation Scores
Submitted by
aekwall
on Mon, 06/10/2019 - 9:19am
amplification DDoS
attack mitigation
composability
DDoS attack mitigation
distributed denial of service
Human behavior
MANET Attack Mitigation
Metrics
packet filtering
pubcrawl
reputation score
Resiliency
Security Heuristics
biblio
Countering Control Message Manipulation Attacks on OLSR
Submitted by
aekwall
on Mon, 06/10/2019 - 9:19am
MANET security
blackhole attacks
composability
MANET Attack Mitigation
MANETs
Metrics
Olsr Routing
pubcrawl
Resiliency
trust computation
biblio
An Attack Scenario and Mitigation Mechanism for Enterprise BYOD Environments
Submitted by
aekwall
on Mon, 06/10/2019 - 9:17am
attack mitigation
bring your own device (BYOD)
composability
countermeasures
BYOD
data leakage
enterprise networks
Internet of Things (IoT)
MANET Attack Mitigation
Metrics
pubcrawl
Resiliency
rogue access point
security
smartwatch
wi-fi direct printers
biblio
Stellar: Network Attack Mitigation Using Advanced Blackholing
Submitted by
aekwall
on Mon, 06/10/2019 - 9:17am
BGP
blackholing
composability
DDoS
DDoS attack mitigation
ddos mitigation
Human behavior
IXP
MANET Attack Mitigation
Metrics
pubcrawl
Resiliency
biblio
Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
Submitted by
aekwall
on Mon, 06/10/2019 - 9:17am
Ad hoc networks
composability
data privacy
edge network assistance
flow routing optimization problem
identifying apps
MANET Attack Mitigation
Metrics
mobile ad hoc networks
mobile computing
multipath routing scheme
privacy
probability
pubcrawl
Relays
Resiliency
Routing
security
smart phones
smartphone apps
smartphone sales
Smartphones
splitting traffic
telecommunication network routing
telecommunication security
telecommunication traffic
traffic analysis attack mitigation
traffic morphing
user security
wireless sensor networks
biblio
Prevention of Timing Attack in Software Defined Named Data Network with VANETs
Submitted by
aekwall
on Mon, 06/10/2019 - 9:16am
attack
attacker vehicles
composability
computer network security
content
data network
Human behavior
Interest
internet
Internet technique
IP networks
IPv4 addressing problems
MANET
MANET Attack Mitigation
Metrics
mobile computing
named data networking
named data networks
Named Data Network Security
NDN techniques
Peer-to-peer computing
Protocols
pubcrawl
Resiliency
Safety
Scalability
SDN
Software
Software Defined Network
software defined networking
Software Defined Networks
TAP protocol
telecommunication network topology
timing
Timing Attack Prevention protocol
V2I communication
V2V communication
VANET
vehicle to infrastructure communication
vehicle-to-vehicle communication
vehicular
vehicular ad hoc networks
Vehicular Ad-hoc Network
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by
aekwall
on Mon, 06/10/2019 - 9:16am
Acknowledgment Packet
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Cryptographic Protocols
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
malicious nodes
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
network security
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
biblio
Mitigating wormhole attack in MANET using absolute deviation statistical approach
Submitted by
aekwall
on Mon, 06/10/2019 - 9:16am
absolute deviation
absolute deviation correlation coefficient
absolute deviation statistical approach
AD correlation
Color
composability
Correlation
correlation coefficient
correlation methods
covariance
fake tunnel
MANET
MANET Attack Mitigation
MATLAB simulator
Metrics
mobile ad hoc networks
Peer-to-peer computing
pubcrawl
Resiliency
telecommunication network routing
telecommunication security
Throughput
wormhole attack
wormhole attack mitigation