Artículos de revistas sobre el tema "FLOODING CONTROL PROTOCOL"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "FLOODING CONTROL PROTOCOL".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy y Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks". Electronics 10, n.º 18 (16 de septiembre de 2021): 2274. http://dx.doi.org/10.3390/electronics10182274.
Texto completoZHANG, YING y MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS". Journal of Interconnection Networks 07, n.º 04 (diciembre de 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.
Texto completoTang, Churan y Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding". ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.
Texto completoSingh, Prabhdeep, Anuj Kumar Gupta y Ravinder Singh. "Improved priority-based data aggregation congestion control protocol". Modern Physics Letters B 34, n.º 02 (20 de diciembre de 2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.
Texto completoAl-Shihri, Fatima y Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks". International Journal on Semantic Web and Information Systems 13, n.º 2 (abril de 2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.
Texto completoPrabhu. M, Mr Dinesh y Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach". International Journal of Engineering and Computer Science 10, n.º 12 (15 de diciembre de 2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.
Texto completoShams Shafigh, Alireza, Kamran Abdollahi y Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol". Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.
Texto completoDey, Tanay, M. M. A. Hashem y Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS". IIUM Engineering Journal 11, n.º 2 (19 de noviembre de 2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.
Texto completoChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen y Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks". Wireless Communications and Mobile Computing 2020 (20 de noviembre de 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Texto completoElejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan y Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks". Applied Sciences 12, n.º 12 (16 de junio de 2022): 6150. http://dx.doi.org/10.3390/app12126150.
Texto completoTung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena y Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN". Electronics 9, n.º 8 (1 de agosto de 2020): 1239. http://dx.doi.org/10.3390/electronics9081239.
Texto completoTun, Thazin. "A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark". Transactions on Networks and Communications 8, n.º 3 (30 de junio de 2020): 08–15. http://dx.doi.org/10.14738/tnc.83.8250.
Texto completoPai H., Aditya, Khalid K. Almuzaini, Liaqat Ali, Ashir Javeed, Bhasker Pant, Piyush Kumar Pareek y Reynah Akwafo. "Delay-Driven Opportunistic Routing with Multichannel Cooperative Neighbor Discovery for Industry 4.0 Wireless Networks Based on Power and Load Awareness". Wireless Communications and Mobile Computing 2022 (4 de abril de 2022): 1–12. http://dx.doi.org/10.1155/2022/5256133.
Texto completoOnyema, Edeh Michael, M. Anand Kumar, Sundaravadivazhagn Balasubaramanian, Salil Bharany, Ateeq Ur Rehman, Elsayed Tag Eldin y Muhammad Shafiq. "A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks". Sustainability 14, n.º 19 (22 de septiembre de 2022): 11950. http://dx.doi.org/10.3390/su141911950.
Texto completoNam, Youngju, Hyunseok Choi, Yongje Shin, Soochang Park y Euisin Lee. "Expected Area-Based Real-Time Routing Protocol for Supporting Mobile Sinks in Wireless Sensor Networks". Electronics 11, n.º 20 (17 de octubre de 2022): 3350. http://dx.doi.org/10.3390/electronics11203350.
Texto completoSingh, Jaspreet, Gurpreet Singh, Deepali Gupta, Ghulam Muhammad y Ali Nauman. "OCI-OLSR: An Optimized Control Interval-Optimized Link State Routing-Based Efficient Routing Mechanism for Ad-Hoc Networks". Processes 11, n.º 5 (8 de mayo de 2023): 1419. http://dx.doi.org/10.3390/pr11051419.
Texto completoJing, Chun Guo y Jun Wei Wang. "Simulation of Street Light Pole Controller Routing with OMNeT++". Applied Mechanics and Materials 401-403 (septiembre de 2013): 1976–80. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1976.
Texto completoBaba, Abubakar M., Simon, T. Apeh y Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (15 de diciembre de 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Texto completoPrabhavat, Sumet, Worrawat Narongkhachavana, Thananop Thongthavorn y Chanakan Phankaew. "Low Overhead Localized Routing in Mobile Ad Hoc Networks". Wireless Communications and Mobile Computing 2019 (22 de septiembre de 2019): 1–15. http://dx.doi.org/10.1155/2019/9652481.
Texto completoGuo, Weizhen, Min Zhu, Bo Yang, Yanbo Wu y Xinguo Li. "Design of a Self-Organizing Routing Protocol for Underwater Wireless Sensor Networks Based on Location and Energy Information". Journal of Marine Science and Engineering 11, n.º 8 (19 de agosto de 2023): 1620. http://dx.doi.org/10.3390/jmse11081620.
Texto completoShin, Byoungheon y Dongman Lee. "An Efficient Local Repair-Based Multi-Constrained Routing for Congestion Control in Wireless Mesh Networks". Wireless Communications and Mobile Computing 2018 (14 de noviembre de 2018): 1–17. http://dx.doi.org/10.1155/2018/2893494.
Texto completoHsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung y YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor". Sensors 21, n.º 6 (11 de marzo de 2021): 1980. http://dx.doi.org/10.3390/s21061980.
Texto completoLiu, Hao Fan y Ping Li. "An Approach on Optimization of ZigBee Network Routing Algorithm". Applied Mechanics and Materials 347-350 (agosto de 2013): 1987–91. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1987.
Texto completoAkinsolu, Mobayode O., Abimbola O. Sangodoyin y Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis". Mathematics 10, n.º 14 (21 de julio de 2022): 2536. http://dx.doi.org/10.3390/math10142536.
Texto completoKim, Daehee, Sejun Song y Baek-Young Choi. "Energy-Efficient Adaptive Geosource Multicast Routing for Wireless Sensor Networks". Journal of Sensors 2013 (2013): 1–14. http://dx.doi.org/10.1155/2013/142078.
Texto completoMueller, Andrew, Anthony Thomas, Jeffrey Brown, Abram Young, Kim Smith, Roxanne Connelly y Stephanie L. Richards. "Geographic information system protocol for mapping areas targeted for mosquito control in North Carolina". PLOS ONE 18, n.º 3 (24 de marzo de 2023): e0278253. http://dx.doi.org/10.1371/journal.pone.0278253.
Texto completoYamazaki, Satoshi, Yu Abiko y Hideki Mizuno. "A Simple and Energy-Efficient Flooding Scheme for Wireless Routing". Wireless Communications and Mobile Computing 2020 (20 de agosto de 2020): 1–9. http://dx.doi.org/10.1155/2020/8832602.
Texto completoKim, Jaebeom, Byung-Seok Park y Yong-up Park. "Flooding Message Mitigation of Wireless Content Centric Networking for Last-Mile Smart-Grid". Applied Sciences 9, n.º 19 (23 de septiembre de 2019): 3978. http://dx.doi.org/10.3390/app9193978.
Texto completoPark, Sang-Hyun, Seungryong Cho y Jung-Ryun Lee. "Energy-Efficient Probabilistic Routing Algorithm for Internet of Things". Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/213106.
Texto completoKhan, Fawad Ali, Rafidah Md Noor, Miss Laiha Mat Kiah, Ismail Ahmedy, Mohd Yamani, Tey Kok Soon y Muneer Ahmad. "Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things". Sensors 20, n.º 1 (3 de enero de 2020): 283. http://dx.doi.org/10.3390/s20010283.
Texto completoAlasri, Abbas y Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool". International Journal of Engineering & Technology 7, n.º 4.7 (27 de septiembre de 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.
Texto completoRani, Shalli, Deepika Koundal, Kavita, Muhammad Fazal Ijaz, Mohamed Elhoseny y Mohammed I. Alghamdi. "An Optimized Framework for WSN Routing in the Context of Industry 4.0". Sensors 21, n.º 19 (28 de septiembre de 2021): 6474. http://dx.doi.org/10.3390/s21196474.
Texto completoKhalid, Khuram, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh y Leonard Barolli. "A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks". Journal of High Speed Networks 27, n.º 1 (29 de marzo de 2021): 1–12. http://dx.doi.org/10.3233/jhs-210648.
Texto completoJavaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq y T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks". Mathematical Problems in Engineering 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/105245.
Texto completoJavaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq y T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks". Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/105245.
Texto completoRouissat, Mehdi, Mohammed Belkheir y Hichem Sid Ahmed Belkhira. "A potential flooding version number attack against RPL based IOT networks". Journal of Electrical Engineering 73, n.º 4 (1 de agosto de 2022): 267–75. http://dx.doi.org/10.2478/jee-2022-0035.
Texto completoKim, Taeguen, Jiyoon Kim y Ilsun You. "An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network". Electronics 12, n.º 17 (22 de agosto de 2023): 3543. http://dx.doi.org/10.3390/electronics12173543.
Texto completoLatah, Majd y Levent Toker. "A novel intelligent approach for detecting DoS flooding attacks in software-defined networks". International Journal of Advances in Intelligent Informatics 4, n.º 1 (31 de marzo de 2018): 11. http://dx.doi.org/10.26555/ijain.v4i1.138.
Texto completoSamal, Chandra Kanta. "Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks". International journal of Computer Networks & Communications 15, n.º 2 (30 de marzo de 2023): 22–38. http://dx.doi.org/10.5121/ijcnc.2023.15202.
Texto completoLogie, Carmen H., Danielle Toccalino, Anna Cooper Reed, Kalonde Malama, Peter A. Newman, Sheri Weiser, Orlando Harris, Isha Berry y Adebola Adedimeji. "Exploring linkages between climate change and sexual health: a scoping review protocol". BMJ Open 11, n.º 10 (octubre de 2021): e054720. http://dx.doi.org/10.1136/bmjopen-2021-054720.
Texto completoJamil, Harun, Abid Ali y Faisal Jamil. "Spoofing Attack Mitigation in Address Resolution Protocol (ARP) and DDoS in Software-Defined Networking". Journal of Information Security and Cybercrimes Research 5, n.º 1 (30 de junio de 2022): 31–42. http://dx.doi.org/10.26735/vbvs3993.
Texto completoKumar Pallai, Gyanendra, Meenakshi Sankaran y Amiya Kumar Rath. "Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET". International journal of Computer Networks & Communications 13, n.º 2 (31 de marzo de 2021): 15–36. http://dx.doi.org/10.5121/ijcnc.2021.13202.
Texto completoZafar, Sherin y Neha Sharma. "Inculcating Trust in Hybrid Routing Approach for Securing MANET". International Journal of End-User Computing and Development 8, n.º 2 (julio de 2019): 18–28. http://dx.doi.org/10.4018/ijeucd.2019070102.
Texto completoBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam y Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review". International Journal of Electrical and Computer Engineering (IJECE) 11, n.º 6 (1 de diciembre de 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Texto completoSohail, Hamza, Mahmood ul Hassan, M. A. Elmagzoub, Adel Rajab, Khairan Rajab, Adeel Ahmed, Asadullah Shaikh, Abid Ali y Harun Jamil. "BBSF: Blockchain-Based Secure Weather Forecasting Information through Routing Protocol in Vanet". Sensors 23, n.º 11 (1 de junio de 2023): 5259. http://dx.doi.org/10.3390/s23115259.
Texto completoYoo, Dae-Seung, Van Khoe Ta, Byung-Tae Jang y Hoon Oh. "An Energy-Efficien Slotted Sense Multiple Access Broadcast Protocol for Reliable Command Delivery in Dynamic Wireless Sensor Networks". Sensors 19, n.º 5 (11 de marzo de 2019): 1236. http://dx.doi.org/10.3390/s19051236.
Texto completoSati, Salem, Ahmed Sohoud y Tareg Abulifa. "Energy Efficient Routing Protocol for Mobile Social Sensing Networks". Scalable Computing: Practice and Experience 20, n.º 4 (4 de diciembre de 2019): 641–51. http://dx.doi.org/10.12694/scpe.v20i4.1579.
Texto completoDaru, April Firman, Kristoko Dwi Hartomo y Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 5 (1 de octubre de 2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.
Texto completoAlzahrani, Ali y Theyazn H. H. Aldhyani. "Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks". Electronics 11, n.º 22 (21 de noviembre de 2022): 3837. http://dx.doi.org/10.3390/electronics11223837.
Texto completoJočys, Linas Juozas. "ICMPV6 RA FLOODING VULNERABILITY RESEARCH / ICMPV6 PROTOKOLO RA ŽINUČIŲ ATSISAKYMO APTARNAUTI ATAKOS TYRIMAS". Mokslas – Lietuvos ateitis 8, n.º 3 (29 de junio de 2016): 273–77. http://dx.doi.org/10.3846/mla.2016.930.
Texto completo