Search

Your search keyword '"Malicious node"' showing total 572 results

Search Constraints

Start Over You searched for: Descriptor "Malicious node" Remove constraint Descriptor: "Malicious node"
572 results on '"Malicious node"'

Search Results

1. Fuzzy Logic Based Trust Evaluation and Malicious Node Detection During DoS and DDoS Attack in IoT Networks

2. An improving secure communication using multipath malicious avoidance routing protocol for underwater sensor network

3. ML Based Hybrid Computational Intelligence Protocol to Improve Energy Efficiency and Security in Opportunistic Networks (Oppnets).

4. VMRF: revolutionizing military border surveillance with extensive coverage and connectivity.

6. Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks

7. Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm

8. Development of Consensus Trust-based Mechanism with Expulsion of Malicious Nodes for Permissioned Private Blockchain Networks.

9. TwI-FTM: Two-way IoT-FoG trust management scheme for task offloading in IoT-FoG networks

10. A Comparative Study on Software-Defined Network with Traditional Networks.

11. Secure Routing Strategy Based on Attribute-Based Trust Access Control in Social-Aware Networks.

12. Maximum Decision Support Regression-Based Advance Secure Data Encrypt Transmission for Healthcare Data Sharing in the Cloud Computing

13. Review on Impact of Attacks as a Malicious Node in MANET

14. An Adaptive Scheme for Detection of Attack in Energy-Aware Dual-Path Geographic Routing (EDGR)

15. Adversarial attacks against dynamic graph neural networks via node injection

16. Reputation-Based Opportunistic Routing Protocol Using Q-Learning for MANET Attacked by Malicious Nodes

17. Transmission Protocol of Emergency Messages in VANET Based on the Trust Level of Nodes

19. 基于信任机制的电力无线传感网络安全簇头选举算法.

20. Detecting ANS Isolating Black-Hole Attacks in Manet using Timer based Baited Technique.

24. Detecting Malicious Roadside Units in Vehicular Social Networks for Information Service.

25. Avoid Suspicious Route of Blackhole Nodes in MANET's: Using A Cooperative Trapping.

26. Secure Modern Wireless Communication Network Based on Blockchain Technology.

27. Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.

28. Hidden Markov Trust for Attenuation of Selfish and Malicious Nodes in the IoT Network.

29. Security Attacks in Internet of Things: A Review

30. To Identify the Sinkhole Attack Using Zone Based Leader Election Method

31. Fuzzy Expert System-Based Node Trust Estimation in Wireless Sensor Networks

32. Hybrid Acknowledgment Scheme for Early Malicious Node Detection in Wireless Sensor Networks

33. Security Measures in the Vehicular Ad-Hoc Networks in the Aspect of DoS Attack

34. An Effective Approach to Detect and Prevent Collaborative Grayhole Attack by Malicious Node in MANET

35. Blockchain-Based Trusted Traffic Offloading in Space-Air-Ground Integrated Networks (SAGIN): A Federated Reinforcement Learning Approach.

36. TMTACS: Two-Tier Multi-Trust-Based Algorithm to Countermeasure the Sybil Attacks.

37. An Efficient Clustering Framework with an Optimized CPSO-SCFO Method for Stabilized and Secured Data Transmission.

38. Enhancing cooperation in MANET using neighborhood compressive sensing model

40. Improving Reliability of Mobile Social Cloud Computing using Machine Learning in Content Addressable Network

41. An Enhanced Trust Based Fuzzy Implicit Cross-Layer Protocol for Wireless Sensor Networks

43. Fuzzy Logic Based Packet Dropping Detection Approach for Mobile Ad-Hoc Wireless Network

44. A Compressive Family Based Efficient Trust Routing Protocol (C-FETRP) for Maximizing the Lifetime of WSN

45. ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks

46. DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks

48. A Novel Fuzzy Logic-Based Scheme for Malicious Node Eviction in a Vehicular Ad Hoc Network.

49. Diagnosis of abnormal body temperature based on deep neural network.

50. A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)

Catalog

Books, media, physical & digital resources