Artículos de revistas sobre el tema "Malicious node"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Malicious node".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Muruganandam, D. y J. Martin Leo Manickam. "Detection and Countermeasure of Packet Misrouting in Wireless Adhoc Networks". Sensor Letters 17, n.º 9 (1 de septiembre de 2019): 696–700. http://dx.doi.org/10.1166/sl.2019.4127.
Texto completoBhardwaj, Indu, Sibaram Khara y Priestly Shan. "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions". Scalable Computing: Practice and Experience 21, n.º 3 (1 de agosto de 2020): 451–62. http://dx.doi.org/10.12694/scpe.v21i3.1743.
Texto completoZhang, Zhao Hui, Ming Ming Hu, Dong Li y Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks". Applied Mechanics and Materials 519-520 (febrero de 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.
Texto completoZhang, Zhiming, Yu Yang, Wei Yang, Fuying Wu, Ping Li y Xiaoyong Xiong. "Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks". Security and Communication Networks 2021 (24 de septiembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/9082570.
Texto completoSubramanian, Ananda Kumar, Aritra Samanta, Sasmithaa Manickam, Abhinav Kumar, Stavros Shiaeles y Anand Mahendran. "Linear Regression Trust Management System for IoT Systems". Cybernetics and Information Technologies 21, n.º 4 (1 de diciembre de 2021): 15–27. http://dx.doi.org/10.2478/cait-2021-0040.
Texto completoZhang, Bo, Qianqian Song, Tao Yang, Zhonghua Zheng y Huan Zhang. "A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective". Mobile Information Systems 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/5185170.
Texto completoAlkhalidy, Muhsen, Atalla Fahed Al-Serhan, Ayoub Alsarhan y Bashar Igried. "A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior". Future Internet 14, n.º 8 (26 de julio de 2022): 223. http://dx.doi.org/10.3390/fi14080223.
Texto completoSivamurugan, D. y L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY". International Journal of Research -GRANTHAALAYAH 5, n.º 4 (30 de abril de 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Texto completoAlsarhan, Ayoub, Abdel-Rahman Al-Ghuwairi, Esra'a Alshdaifat, Hasan Idhaim y Omar Alkhawaldeh. "A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique". International Journal of Interactive Mobile Technologies (iJIM) 16, n.º 03 (10 de febrero de 2022): 136–50. http://dx.doi.org/10.3991/ijim.v16i03.27933.
Texto completoChen, Jing, Tong Li y Rui Zhu. "Analysis of Malicious Node Identification Algorithm of Internet of Vehicles under Blockchain Technology: A Case Study of Intelligent Technology in Automotive Engineering". Applied Sciences 12, n.º 16 (21 de agosto de 2022): 8362. http://dx.doi.org/10.3390/app12168362.
Texto completoLi, Feng, Yali Si, Ning Lu, Zhen Chen y Limin Shen. "A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks". Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/2761486.
Texto completoBhaskar .Ch, Vijaya, D. S. R. Murthy y V. Kakulapati. "AODV (ST_AODV) on MANETs with Path Security and Trust-based Routing". International Journal on Recent and Innovation Trends in Computing and Communication 10, n.º 11 (30 de noviembre de 2022): 01–06. http://dx.doi.org/10.17762/ijritcc.v10i11.5772.
Texto completoKumari, Shabnam y Sumit Dalal. "Malicious Node Detection in WSN Using WTE". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30 de junio de 2018): 2386–90. http://dx.doi.org/10.31142/ijtsrd14611.
Texto completoZheng, Guiping, Bei Gong y Yu Zhang. "Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks". Wireless Communications and Mobile Computing 2021 (27 de febrero de 2021): 1–10. http://dx.doi.org/10.1155/2021/6667100.
Texto completoKaur, Kamaljit y Amandeep Kaur. "Detection of Sybil Attack in VANETs". International Journal of Emerging Research in Management and Technology 6, n.º 6 (29 de junio de 2018): 296. http://dx.doi.org/10.23956/ijermt.v6i6.285.
Texto completoTeng, Zhijun, Baohe Pang, Mingyang Sun, Luying Xie y Liwen Guo. "Model for Malicious Node Recognition Based on Environmental Parameter Optimization and Time Reputation Sequence". Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 38, n.º 3 (junio de 2020): 634–42. http://dx.doi.org/10.1051/jnwpu/20203830634.
Texto completoA, Ganesan y Kumar Kombaiya A. "Predicting Malicious Node Behavior in Wireless Network Using DSR Protocol and Network Metrics". International Journal of Computer Communication and Informatics 4, n.º 1 (3 de mayo de 2022): 1–10. http://dx.doi.org/10.34256/ijcci2211.
Texto completoYadav, G. Vidhisha, N. Ramanjaneya Reddy y U. Sesadri. "Performance Analysis of Malicious nodes on Multi hop Cellular Networks". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, n.º 7 (17 de noviembre de 2013): 2752–58. http://dx.doi.org/10.24297/ijct.v11i7.3473.
Texto completoDhingra, Madhavi, SC Jain y Rakesh Singh Jadon. "Study on malicious node detection". Materials Today: Proceedings 29 (2020): 348–51. http://dx.doi.org/10.1016/j.matpr.2020.07.288.
Texto completoJamal, Tauseef y Shariq Aziz Butt. "Malicious node analysis in MANETS". International Journal of Information Technology 11, n.º 4 (20 de abril de 2018): 859–67. http://dx.doi.org/10.1007/s41870-018-0168-2.
Texto completoFarooq, Mohd Umar, Mohammad Pasha, Khaleel Ur Rahman Khan y Mahboob Ul Haq Atif. "An Advanced Security and Data Integrity Protocol for Vehicular Ad-Hoc Networks". Advanced Materials Research 403-408 (noviembre de 2011): 994–1001. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.994.
Texto completoEt al., Dr S. Varalakshmi. "TRUST COMPUTATION USING BOTTOM-UP PARSER APPROACH IN MANET". INFORMATION TECHNOLOGY IN INDUSTRY 9, n.º 1 (18 de marzo de 2021): 1236–41. http://dx.doi.org/10.17762/itii.v9i1.263.
Texto completoLakhani, Kanika. "A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANET". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, n.º 2 (30 de octubre de 2005): 489–94. http://dx.doi.org/10.24297/ijct.v4i2b2.3310.
Texto completoVamshi krishna, H. y Gandharba Swain. "Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method". International Journal of Engineering & Technology 7, n.º 4.7 (27 de septiembre de 2018): 152. http://dx.doi.org/10.14419/ijet.v7i4.7.20533.
Texto completoChen, Miao, Bao Peng y Liang Ma. "A New Security Localization Method for Detecting Malicious Beacon Nodes in Wireless Sensor Networks". Advanced Materials Research 186 (enero de 2011): 428–32. http://dx.doi.org/10.4028/www.scientific.net/amr.186.428.
Texto completoTrivedi, Munesh C. y Sachin Malhotra. "Identification and Prevention of Joint Gray Hole and Black Hole Attacks". International Journal of Ambient Computing and Intelligence 10, n.º 2 (abril de 2019): 80–90. http://dx.doi.org/10.4018/ijaci.2019040106.
Texto completoZhang, Guanqun, Mengxi Liu y Guangjun Zai. "A Blockchain-Based IoT Terminal Trust Mechanism Management Scheme". Journal of Physics: Conference Series 2404, n.º 1 (1 de diciembre de 2022): 012049. http://dx.doi.org/10.1088/1742-6596/2404/1/012049.
Texto completoShi, Qiong, Li Qin, Yinghua Ding, Boli Xie, Jiajie Zheng y Lipeng Song. "Information-Aware Secure Routing in Wireless Sensor Networks". Sensors 20, n.º 1 (26 de diciembre de 2019): 165. http://dx.doi.org/10.3390/s20010165.
Texto completoHarwahyu, Ruki, Boma A. Adhi, Harris Simaremare, Abdusy Syarif, Riri F. Sari y Pascal Lorenz. "AODV-UI with Malicious Node Detection and Removal for Public MANET". Journal of Communications Software and Systems 8, n.º 4 (21 de diciembre de 2012): 110. http://dx.doi.org/10.24138/jcomss.v8i4.165.
Texto completoYue-e, Yi. "Security of the Internet of Things Based on Game Algorithm". International Journal of Online Engineering (iJOE) 14, n.º 08 (30 de agosto de 2018): 80. http://dx.doi.org/10.3991/ijoe.v14i08.9178.
Texto completoZougagh, Hicham, Noureddine Idboufker, Rida Zoubairi y Rachid El Ayachi. "Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems". International Journal of Business Data Communications and Networking 15, n.º 2 (julio de 2019): 73–91. http://dx.doi.org/10.4018/ijbdcn.2019070105.
Texto completoHu, Xiang Dong y Peng Qin Yu. "Detection of False Data Injection Attack in the Internet of Things". Advanced Materials Research 452-453 (enero de 2012): 932–36. http://dx.doi.org/10.4028/www.scientific.net/amr.452-453.932.
Texto completoFadli, Khafidzun, Achmad Basuki y Eko Setiawan. "Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering". Jurnal Teknologi Informasi dan Ilmu Komputer 7, n.º 3 (22 de mayo de 2020): 591. http://dx.doi.org/10.25126/jtiik.2020733339.
Texto completoYu, Xiaosheng, Jie Qin y Peng Chen. "GPBFT: A Practical Byzantine Fault-Tolerant Consensus Algorithm Based on Dual Administrator Short Group Signatures". Security and Communication Networks 2022 (5 de agosto de 2022): 1–11. http://dx.doi.org/10.1155/2022/8311821.
Texto completoPalani, Saravanan, Logesh Ravi, Vijayakumar Varadarajan, Subramaniyaswamy Vairavasundaram y Xiao-Zhi Gao. "Malicious Route Detection in Vehicular Ad-hoc Network using Geographic Routing with Masked Data". Recent Advances in Computer Science and Communications 13, n.º 3 (12 de agosto de 2020): 319–25. http://dx.doi.org/10.2174/2213275912666181205150739.
Texto completoAtassi, Alaa, Naoum Sayegh, Imad H. Elhajj, Ali Chehab y Ayman Kayssi. "Decentralised malicious node detection in WSN". International Journal of Space-Based and Situated Computing 4, n.º 1 (2014): 15. http://dx.doi.org/10.1504/ijssc.2014.060685.
Texto completoChen, Zuo, Min He, Wei Liang y Kai Chen. "Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network". Journal of Sensors 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/716468.
Texto completoKong, Wenping, Xiaoyong Li, Liyang Hou y Yanrong Li. "An Efficient and Credible Multi-Source Trust Fusion Mechanism Based on Time Decay for Edge Computing". Electronics 9, n.º 3 (19 de marzo de 2020): 502. http://dx.doi.org/10.3390/electronics9030502.
Texto completoSaha, Himadri Nath, Rohit Singh, Debika Bhattacharyya y P. K. Banerjee. "Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network". Foundations of Computing and Decision Sciences 40, n.º 4 (1 de diciembre de 2015): 267–98. http://dx.doi.org/10.1515/fcds-2015-0016.
Texto completoMalviya, Taruna y Khushboo Sawant. "Impact of Vampire Attack on Performance of Wireless Sensor Networks: A Survey". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 8 (30 de agosto de 2017): 96. http://dx.doi.org/10.23956/ijarcsse.v7i8.31.
Texto completoWei, Dengfeng y Qing-Ju Jiao. "A Novel Core-Peer Based Trust Model for Peer-to-Peer Networks". Journal of Computational and Theoretical Nanoscience 14, n.º 1 (1 de enero de 2017): 114–18. http://dx.doi.org/10.1166/jctn.2017.6135.
Texto completoFabrice, Sibomana. "DETECTIONAND PREVENTIONOF MALICIOUS NODE BASED ON NODE BEHAVIOUR IN MANET". International Journal of Advanced Research in Computer Science 8, n.º 9 (30 de septiembre de 2017): 774–77. http://dx.doi.org/10.26483/ijarcs.v8i9.5213.
Texto completoLiu, Yi, Ruihui Zhao, Jiawen Kang, Abdulsalam Yassine, Dusit Niyato y Jialiang Peng. "Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things". ACM Transactions on Internet Technology 22, n.º 3 (31 de agosto de 2022): 1–22. http://dx.doi.org/10.1145/3453169.
Texto completoRehman, Eid, Muhammad Sher, Syed Hussnain Abbas Naqvi, Khan Badar Khan y Kamran Ullah. "Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network". Journal of Computer Networks and Communications 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/1630673.
Texto completoAranganathan, A. y C. D. Suriyakala. "Intelligent agents based trusted revocation for securing clustering MANETS". APTIKOM Journal on Computer Science and Information Technologies 3, n.º 1 (22 de enero de 2020): 1–5. http://dx.doi.org/10.34306/csit.v3i1.75.
Texto completoAranganathan, A. y C. D. Suriyakala. "Intelligent agents based trusted revocation for securing clustering MANETS". APTIKOM Journal on Computer Science and Information Technologies 3, n.º 1 (1 de marzo de 2018): 1–5. http://dx.doi.org/10.11591/aptikom.j.csit.79.
Texto completoZhao, Junwei y Xi Chen. "An Opinion Evolution Model Based on Heterogeneous Benefit with Malicious Nodes Added". Complexity 2021 (16 de abril de 2021): 1–9. http://dx.doi.org/10.1155/2021/6642698.
Texto completoSu, Zhen Zhen, Er Kun Sun, Xiao Gang Qi, Ying Nie, Wei Hong Lin y Man De Xie. "A Security Routing Protocol Based on Convergence Degree and Trust". Applied Mechanics and Materials 519-520 (febrero de 2014): 155–59. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.155.
Texto completoO., Amusan, Thompson A. F., Aderinola T. B. y Alese B. K. "Modelling Malicious Attack in Social Networks". Network and Communication Technologies 5, n.º 1 (6 de febrero de 2020): 37. http://dx.doi.org/10.5539/nct.v5n1p37.
Texto completoAncy Breen, W., S. Durga Devi, E. Sushmitha y V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet". International Journal of Engineering & Technology 7, n.º 3.34 (1 de septiembre de 2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Texto completo