Keyphrases
Attacker
95%
Wireless Networks
68%
Jamming
67%
Ad Hoc Networks
61%
Vehicular Ad Hoc Networks
54%
Ad Hoc Network Routing
47%
Denial-of-service Attack
39%
Wireless Ad-hoc Networks (WANETs)
36%
Network Routing Protocol
34%
Routing Protocol
32%
Jammer
29%
Vulnerability
29%
On-demand Routing Protocol
27%
Medium Access Control
26%
Adversary
26%
Jamming Attack
23%
Secure Wireless Communication
23%
Insider
22%
Resilient
22%
World Wide Web
20%
Transmitter
20%
Wireless
20%
Router
20%
Wireless Charging
20%
Network Applications
19%
Certificate Authority
18%
Sender
17%
Jamming Mitigation
17%
On Demand
17%
Physical Layer
17%
Wireless Networking
17%
Clock Synchronization
16%
Medium Access Control Layer
16%
Wireless Sensor Networks
16%
Certificate Revocation List
15%
Wireless Broadcasting Systems
15%
Caching
15%
Adversarial Nodes
15%
Multi-hop Wireless Ad Hoc Networks
15%
Clean Slate Approach
15%
Wireless Medium Access
15%
Low Latency
14%
Mobile Ad Hoc Network (MANET)
14%
Channel Condition
14%
In-network
14%
Network Performance
13%
Confidentiality
13%
Blockchain
12%
Network Flow
12%
Quality of Experience
12%
Computer Science
Attackers
100%
ad-hoc network
78%
Wireless Network
73%
Routing Protocol
72%
wireless ad hoc network
62%
Denial-of-Service
48%
Network Routing
45%
Authentication
32%
Media Access Control
31%
Wireless Communication
29%
Vehicular Network
27%
Wireless Networking
26%
Physical Layer
25%
Vehicular Ad Hoc Network
25%
Wireless Medium
24%
Spread Spectrum
23%
Network Performance
20%
Channel Condition
17%
Certificate Authority
16%
Media Access Control Protocol
15%
Blockchain
15%
vehicular ad-hoc network
15%
Certificate Revocation List
15%
Broadcast Wireless Network
15%
Layer Protocol
15%
Privacy Preserving
14%
Network Security
12%
Testbed
12%
Adversarial Strategy
12%
Location Information
12%
Quality-of-Experience
12%
Video Streaming
12%
Streaming Service
12%
Clock Synchronization
11%
Quality of Service
11%
Distance Vector
11%
Digital Signature
11%
Denial-of-Service Attack
11%
Access Point
11%
Security Properties
11%
Secure Protocol
10%
Revocation Certificate
10%
Transmission Range
10%
Ad Hoc On-Demand Distance Vector
10%
Communication Requirement
10%
Key Generation
10%
Connection Establishment
10%
Link Bandwidth
10%
Precise Location
10%
Secure Location
10%