Journal articles on the topic 'FLOODING CONTROL PROTOCOL'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'FLOODING CONTROL PROTOCOL.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy, and Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks." Electronics 10, no. 18 (September 16, 2021): 2274. http://dx.doi.org/10.3390/electronics10182274.
Full textZHANG, YING, and MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (December 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.
Full textTang, Churan, and Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding." ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.
Full textSingh, Prabhdeep, Anuj Kumar Gupta, and Ravinder Singh. "Improved priority-based data aggregation congestion control protocol." Modern Physics Letters B 34, no. 02 (December 20, 2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.
Full textAl-Shihri, Fatima, and Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks." International Journal on Semantic Web and Information Systems 13, no. 2 (April 2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.
Full textPrabhu. M, Mr Dinesh, and Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach." International Journal of Engineering and Computer Science 10, no. 12 (December 15, 2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.
Full textShams Shafigh, Alireza, Kamran Abdollahi, and Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol." Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.
Full textDey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (November 19, 2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.
Full textChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen, and Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Full textElejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, and Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks." Applied Sciences 12, no. 12 (June 16, 2022): 6150. http://dx.doi.org/10.3390/app12126150.
Full textTung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (August 1, 2020): 1239. http://dx.doi.org/10.3390/electronics9081239.
Full textTun, Thazin. "A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark." Transactions on Networks and Communications 8, no. 3 (June 30, 2020): 08–15. http://dx.doi.org/10.14738/tnc.83.8250.
Full textPai H., Aditya, Khalid K. Almuzaini, Liaqat Ali, Ashir Javeed, Bhasker Pant, Piyush Kumar Pareek, and Reynah Akwafo. "Delay-Driven Opportunistic Routing with Multichannel Cooperative Neighbor Discovery for Industry 4.0 Wireless Networks Based on Power and Load Awareness." Wireless Communications and Mobile Computing 2022 (April 4, 2022): 1–12. http://dx.doi.org/10.1155/2022/5256133.
Full textOnyema, Edeh Michael, M. Anand Kumar, Sundaravadivazhagn Balasubaramanian, Salil Bharany, Ateeq Ur Rehman, Elsayed Tag Eldin, and Muhammad Shafiq. "A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks." Sustainability 14, no. 19 (September 22, 2022): 11950. http://dx.doi.org/10.3390/su141911950.
Full textNam, Youngju, Hyunseok Choi, Yongje Shin, Soochang Park, and Euisin Lee. "Expected Area-Based Real-Time Routing Protocol for Supporting Mobile Sinks in Wireless Sensor Networks." Electronics 11, no. 20 (October 17, 2022): 3350. http://dx.doi.org/10.3390/electronics11203350.
Full textSingh, Jaspreet, Gurpreet Singh, Deepali Gupta, Ghulam Muhammad, and Ali Nauman. "OCI-OLSR: An Optimized Control Interval-Optimized Link State Routing-Based Efficient Routing Mechanism for Ad-Hoc Networks." Processes 11, no. 5 (May 8, 2023): 1419. http://dx.doi.org/10.3390/pr11051419.
Full textJing, Chun Guo, and Jun Wei Wang. "Simulation of Street Light Pole Controller Routing with OMNeT++." Applied Mechanics and Materials 401-403 (September 2013): 1976–80. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1976.
Full textBaba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Full textPrabhavat, Sumet, Worrawat Narongkhachavana, Thananop Thongthavorn, and Chanakan Phankaew. "Low Overhead Localized Routing in Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2019 (September 22, 2019): 1–15. http://dx.doi.org/10.1155/2019/9652481.
Full textGuo, Weizhen, Min Zhu, Bo Yang, Yanbo Wu, and Xinguo Li. "Design of a Self-Organizing Routing Protocol for Underwater Wireless Sensor Networks Based on Location and Energy Information." Journal of Marine Science and Engineering 11, no. 8 (August 19, 2023): 1620. http://dx.doi.org/10.3390/jmse11081620.
Full textShin, Byoungheon, and Dongman Lee. "An Efficient Local Repair-Based Multi-Constrained Routing for Congestion Control in Wireless Mesh Networks." Wireless Communications and Mobile Computing 2018 (November 14, 2018): 1–17. http://dx.doi.org/10.1155/2018/2893494.
Full textHsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung, and YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor." Sensors 21, no. 6 (March 11, 2021): 1980. http://dx.doi.org/10.3390/s21061980.
Full textLiu, Hao Fan, and Ping Li. "An Approach on Optimization of ZigBee Network Routing Algorithm." Applied Mechanics and Materials 347-350 (August 2013): 1987–91. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1987.
Full textAkinsolu, Mobayode O., Abimbola O. Sangodoyin, and Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis." Mathematics 10, no. 14 (July 21, 2022): 2536. http://dx.doi.org/10.3390/math10142536.
Full textKim, Daehee, Sejun Song, and Baek-Young Choi. "Energy-Efficient Adaptive Geosource Multicast Routing for Wireless Sensor Networks." Journal of Sensors 2013 (2013): 1–14. http://dx.doi.org/10.1155/2013/142078.
Full textMueller, Andrew, Anthony Thomas, Jeffrey Brown, Abram Young, Kim Smith, Roxanne Connelly, and Stephanie L. Richards. "Geographic information system protocol for mapping areas targeted for mosquito control in North Carolina." PLOS ONE 18, no. 3 (March 24, 2023): e0278253. http://dx.doi.org/10.1371/journal.pone.0278253.
Full textYamazaki, Satoshi, Yu Abiko, and Hideki Mizuno. "A Simple and Energy-Efficient Flooding Scheme for Wireless Routing." Wireless Communications and Mobile Computing 2020 (August 20, 2020): 1–9. http://dx.doi.org/10.1155/2020/8832602.
Full textKim, Jaebeom, Byung-Seok Park, and Yong-up Park. "Flooding Message Mitigation of Wireless Content Centric Networking for Last-Mile Smart-Grid." Applied Sciences 9, no. 19 (September 23, 2019): 3978. http://dx.doi.org/10.3390/app9193978.
Full textPark, Sang-Hyun, Seungryong Cho, and Jung-Ryun Lee. "Energy-Efficient Probabilistic Routing Algorithm for Internet of Things." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/213106.
Full textKhan, Fawad Ali, Rafidah Md Noor, Miss Laiha Mat Kiah, Ismail Ahmedy, Mohd Yamani, Tey Kok Soon, and Muneer Ahmad. "Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things." Sensors 20, no. 1 (January 3, 2020): 283. http://dx.doi.org/10.3390/s20010283.
Full textAlasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.
Full textRani, Shalli, Deepika Koundal, Kavita, Muhammad Fazal Ijaz, Mohamed Elhoseny, and Mohammed I. Alghamdi. "An Optimized Framework for WSN Routing in the Context of Industry 4.0." Sensors 21, no. 19 (September 28, 2021): 6474. http://dx.doi.org/10.3390/s21196474.
Full textKhalid, Khuram, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh, and Leonard Barolli. "A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks." Journal of High Speed Networks 27, no. 1 (March 29, 2021): 1–12. http://dx.doi.org/10.3233/jhs-210648.
Full textJavaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq, and T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks." Mathematical Problems in Engineering 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/105245.
Full textJavaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq, and T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks." Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/105245.
Full textRouissat, Mehdi, Mohammed Belkheir, and Hichem Sid Ahmed Belkhira. "A potential flooding version number attack against RPL based IOT networks." Journal of Electrical Engineering 73, no. 4 (August 1, 2022): 267–75. http://dx.doi.org/10.2478/jee-2022-0035.
Full textKim, Taeguen, Jiyoon Kim, and Ilsun You. "An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network." Electronics 12, no. 17 (August 22, 2023): 3543. http://dx.doi.org/10.3390/electronics12173543.
Full textLatah, Majd, and Levent Toker. "A novel intelligent approach for detecting DoS flooding attacks in software-defined networks." International Journal of Advances in Intelligent Informatics 4, no. 1 (March 31, 2018): 11. http://dx.doi.org/10.26555/ijain.v4i1.138.
Full textSamal, Chandra Kanta. "Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks." International journal of Computer Networks & Communications 15, no. 2 (March 30, 2023): 22–38. http://dx.doi.org/10.5121/ijcnc.2023.15202.
Full textLogie, Carmen H., Danielle Toccalino, Anna Cooper Reed, Kalonde Malama, Peter A. Newman, Sheri Weiser, Orlando Harris, Isha Berry, and Adebola Adedimeji. "Exploring linkages between climate change and sexual health: a scoping review protocol." BMJ Open 11, no. 10 (October 2021): e054720. http://dx.doi.org/10.1136/bmjopen-2021-054720.
Full textJamil, Harun, Abid Ali, and Faisal Jamil. "Spoofing Attack Mitigation in Address Resolution Protocol (ARP) and DDoS in Software-Defined Networking." Journal of Information Security and Cybercrimes Research 5, no. 1 (June 30, 2022): 31–42. http://dx.doi.org/10.26735/vbvs3993.
Full textKumar Pallai, Gyanendra, Meenakshi Sankaran, and Amiya Kumar Rath. "Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET." International journal of Computer Networks & Communications 13, no. 2 (March 31, 2021): 15–36. http://dx.doi.org/10.5121/ijcnc.2021.13202.
Full textZafar, Sherin, and Neha Sharma. "Inculcating Trust in Hybrid Routing Approach for Securing MANET." International Journal of End-User Computing and Development 8, no. 2 (July 2019): 18–28. http://dx.doi.org/10.4018/ijeucd.2019070102.
Full textBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam, and Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Full textSohail, Hamza, Mahmood ul Hassan, M. A. Elmagzoub, Adel Rajab, Khairan Rajab, Adeel Ahmed, Asadullah Shaikh, Abid Ali, and Harun Jamil. "BBSF: Blockchain-Based Secure Weather Forecasting Information through Routing Protocol in Vanet." Sensors 23, no. 11 (June 1, 2023): 5259. http://dx.doi.org/10.3390/s23115259.
Full textYoo, Dae-Seung, Van Khoe Ta, Byung-Tae Jang, and Hoon Oh. "An Energy-Efficien Slotted Sense Multiple Access Broadcast Protocol for Reliable Command Delivery in Dynamic Wireless Sensor Networks." Sensors 19, no. 5 (March 11, 2019): 1236. http://dx.doi.org/10.3390/s19051236.
Full textSati, Salem, Ahmed Sohoud, and Tareg Abulifa. "Energy Efficient Routing Protocol for Mobile Social Sensing Networks." Scalable Computing: Practice and Experience 20, no. 4 (December 4, 2019): 641–51. http://dx.doi.org/10.12694/scpe.v20i4.1579.
Full textDaru, April Firman, Kristoko Dwi Hartomo, and Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (October 1, 2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.
Full textAlzahrani, Ali, and Theyazn H. H. Aldhyani. "Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks." Electronics 11, no. 22 (November 21, 2022): 3837. http://dx.doi.org/10.3390/electronics11223837.
Full textJočys, Linas Juozas. "ICMPV6 RA FLOODING VULNERABILITY RESEARCH / ICMPV6 PROTOKOLO RA ŽINUČIŲ ATSISAKYMO APTARNAUTI ATAKOS TYRIMAS." Mokslas – Lietuvos ateitis 8, no. 3 (June 29, 2016): 273–77. http://dx.doi.org/10.3846/mla.2016.930.
Full text