Artykuły w czasopismach na temat „FLOODING CONTROL PROTOCOL”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „FLOODING CONTROL PROTOCOL”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy i Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks". Electronics 10, nr 18 (16.09.2021): 2274. http://dx.doi.org/10.3390/electronics10182274.
Pełny tekst źródłaZHANG, YING, i MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS". Journal of Interconnection Networks 07, nr 04 (grudzień 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.
Pełny tekst źródłaTang, Churan, i Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding". ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.
Pełny tekst źródłaSingh, Prabhdeep, Anuj Kumar Gupta i Ravinder Singh. "Improved priority-based data aggregation congestion control protocol". Modern Physics Letters B 34, nr 02 (20.12.2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.
Pełny tekst źródłaAl-Shihri, Fatima, i Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks". International Journal on Semantic Web and Information Systems 13, nr 2 (kwiecień 2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.
Pełny tekst źródłaPrabhu. M, Mr Dinesh, i Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach". International Journal of Engineering and Computer Science 10, nr 12 (15.12.2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.
Pełny tekst źródłaShams Shafigh, Alireza, Kamran Abdollahi i Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol". Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.
Pełny tekst źródłaDey, Tanay, M. M. A. Hashem i Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS". IIUM Engineering Journal 11, nr 2 (19.11.2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.
Pełny tekst źródłaChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen i Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks". Wireless Communications and Mobile Computing 2020 (20.11.2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Pełny tekst źródłaElejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan i Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks". Applied Sciences 12, nr 12 (16.06.2022): 6150. http://dx.doi.org/10.3390/app12126150.
Pełny tekst źródłaTung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena i Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN". Electronics 9, nr 8 (1.08.2020): 1239. http://dx.doi.org/10.3390/electronics9081239.
Pełny tekst źródłaTun, Thazin. "A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark". Transactions on Networks and Communications 8, nr 3 (30.06.2020): 08–15. http://dx.doi.org/10.14738/tnc.83.8250.
Pełny tekst źródłaPai H., Aditya, Khalid K. Almuzaini, Liaqat Ali, Ashir Javeed, Bhasker Pant, Piyush Kumar Pareek i Reynah Akwafo. "Delay-Driven Opportunistic Routing with Multichannel Cooperative Neighbor Discovery for Industry 4.0 Wireless Networks Based on Power and Load Awareness". Wireless Communications and Mobile Computing 2022 (4.04.2022): 1–12. http://dx.doi.org/10.1155/2022/5256133.
Pełny tekst źródłaOnyema, Edeh Michael, M. Anand Kumar, Sundaravadivazhagn Balasubaramanian, Salil Bharany, Ateeq Ur Rehman, Elsayed Tag Eldin i Muhammad Shafiq. "A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks". Sustainability 14, nr 19 (22.09.2022): 11950. http://dx.doi.org/10.3390/su141911950.
Pełny tekst źródłaNam, Youngju, Hyunseok Choi, Yongje Shin, Soochang Park i Euisin Lee. "Expected Area-Based Real-Time Routing Protocol for Supporting Mobile Sinks in Wireless Sensor Networks". Electronics 11, nr 20 (17.10.2022): 3350. http://dx.doi.org/10.3390/electronics11203350.
Pełny tekst źródłaSingh, Jaspreet, Gurpreet Singh, Deepali Gupta, Ghulam Muhammad i Ali Nauman. "OCI-OLSR: An Optimized Control Interval-Optimized Link State Routing-Based Efficient Routing Mechanism for Ad-Hoc Networks". Processes 11, nr 5 (8.05.2023): 1419. http://dx.doi.org/10.3390/pr11051419.
Pełny tekst źródłaJing, Chun Guo, i Jun Wei Wang. "Simulation of Street Light Pole Controller Routing with OMNeT++". Applied Mechanics and Materials 401-403 (wrzesień 2013): 1976–80. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1976.
Pełny tekst źródłaBaba, Abubakar M., Simon, T. Apeh i Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (15.12.2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Pełny tekst źródłaPrabhavat, Sumet, Worrawat Narongkhachavana, Thananop Thongthavorn i Chanakan Phankaew. "Low Overhead Localized Routing in Mobile Ad Hoc Networks". Wireless Communications and Mobile Computing 2019 (22.09.2019): 1–15. http://dx.doi.org/10.1155/2019/9652481.
Pełny tekst źródłaGuo, Weizhen, Min Zhu, Bo Yang, Yanbo Wu i Xinguo Li. "Design of a Self-Organizing Routing Protocol for Underwater Wireless Sensor Networks Based on Location and Energy Information". Journal of Marine Science and Engineering 11, nr 8 (19.08.2023): 1620. http://dx.doi.org/10.3390/jmse11081620.
Pełny tekst źródłaShin, Byoungheon, i Dongman Lee. "An Efficient Local Repair-Based Multi-Constrained Routing for Congestion Control in Wireless Mesh Networks". Wireless Communications and Mobile Computing 2018 (14.11.2018): 1–17. http://dx.doi.org/10.1155/2018/2893494.
Pełny tekst źródłaHsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung i YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor". Sensors 21, nr 6 (11.03.2021): 1980. http://dx.doi.org/10.3390/s21061980.
Pełny tekst źródłaLiu, Hao Fan, i Ping Li. "An Approach on Optimization of ZigBee Network Routing Algorithm". Applied Mechanics and Materials 347-350 (sierpień 2013): 1987–91. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1987.
Pełny tekst źródłaAkinsolu, Mobayode O., Abimbola O. Sangodoyin i Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis". Mathematics 10, nr 14 (21.07.2022): 2536. http://dx.doi.org/10.3390/math10142536.
Pełny tekst źródłaKim, Daehee, Sejun Song i Baek-Young Choi. "Energy-Efficient Adaptive Geosource Multicast Routing for Wireless Sensor Networks". Journal of Sensors 2013 (2013): 1–14. http://dx.doi.org/10.1155/2013/142078.
Pełny tekst źródłaMueller, Andrew, Anthony Thomas, Jeffrey Brown, Abram Young, Kim Smith, Roxanne Connelly i Stephanie L. Richards. "Geographic information system protocol for mapping areas targeted for mosquito control in North Carolina". PLOS ONE 18, nr 3 (24.03.2023): e0278253. http://dx.doi.org/10.1371/journal.pone.0278253.
Pełny tekst źródłaYamazaki, Satoshi, Yu Abiko i Hideki Mizuno. "A Simple and Energy-Efficient Flooding Scheme for Wireless Routing". Wireless Communications and Mobile Computing 2020 (20.08.2020): 1–9. http://dx.doi.org/10.1155/2020/8832602.
Pełny tekst źródłaKim, Jaebeom, Byung-Seok Park i Yong-up Park. "Flooding Message Mitigation of Wireless Content Centric Networking for Last-Mile Smart-Grid". Applied Sciences 9, nr 19 (23.09.2019): 3978. http://dx.doi.org/10.3390/app9193978.
Pełny tekst źródłaPark, Sang-Hyun, Seungryong Cho i Jung-Ryun Lee. "Energy-Efficient Probabilistic Routing Algorithm for Internet of Things". Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/213106.
Pełny tekst źródłaKhan, Fawad Ali, Rafidah Md Noor, Miss Laiha Mat Kiah, Ismail Ahmedy, Mohd Yamani, Tey Kok Soon i Muneer Ahmad. "Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things". Sensors 20, nr 1 (3.01.2020): 283. http://dx.doi.org/10.3390/s20010283.
Pełny tekst źródłaAlasri, Abbas, i Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool". International Journal of Engineering & Technology 7, nr 4.7 (27.09.2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.
Pełny tekst źródłaRani, Shalli, Deepika Koundal, Kavita, Muhammad Fazal Ijaz, Mohamed Elhoseny i Mohammed I. Alghamdi. "An Optimized Framework for WSN Routing in the Context of Industry 4.0". Sensors 21, nr 19 (28.09.2021): 6474. http://dx.doi.org/10.3390/s21196474.
Pełny tekst źródłaKhalid, Khuram, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh i Leonard Barolli. "A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks". Journal of High Speed Networks 27, nr 1 (29.03.2021): 1–12. http://dx.doi.org/10.3233/jhs-210648.
Pełny tekst źródłaJavaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq i T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks". Mathematical Problems in Engineering 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/105245.
Pełny tekst źródłaJavaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq i T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks". Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/105245.
Pełny tekst źródłaRouissat, Mehdi, Mohammed Belkheir i Hichem Sid Ahmed Belkhira. "A potential flooding version number attack against RPL based IOT networks". Journal of Electrical Engineering 73, nr 4 (1.08.2022): 267–75. http://dx.doi.org/10.2478/jee-2022-0035.
Pełny tekst źródłaKim, Taeguen, Jiyoon Kim i Ilsun You. "An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network". Electronics 12, nr 17 (22.08.2023): 3543. http://dx.doi.org/10.3390/electronics12173543.
Pełny tekst źródłaLatah, Majd, i Levent Toker. "A novel intelligent approach for detecting DoS flooding attacks in software-defined networks". International Journal of Advances in Intelligent Informatics 4, nr 1 (31.03.2018): 11. http://dx.doi.org/10.26555/ijain.v4i1.138.
Pełny tekst źródłaSamal, Chandra Kanta. "Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks". International journal of Computer Networks & Communications 15, nr 2 (30.03.2023): 22–38. http://dx.doi.org/10.5121/ijcnc.2023.15202.
Pełny tekst źródłaLogie, Carmen H., Danielle Toccalino, Anna Cooper Reed, Kalonde Malama, Peter A. Newman, Sheri Weiser, Orlando Harris, Isha Berry i Adebola Adedimeji. "Exploring linkages between climate change and sexual health: a scoping review protocol". BMJ Open 11, nr 10 (październik 2021): e054720. http://dx.doi.org/10.1136/bmjopen-2021-054720.
Pełny tekst źródłaJamil, Harun, Abid Ali i Faisal Jamil. "Spoofing Attack Mitigation in Address Resolution Protocol (ARP) and DDoS in Software-Defined Networking". Journal of Information Security and Cybercrimes Research 5, nr 1 (30.06.2022): 31–42. http://dx.doi.org/10.26735/vbvs3993.
Pełny tekst źródłaKumar Pallai, Gyanendra, Meenakshi Sankaran i Amiya Kumar Rath. "Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET". International journal of Computer Networks & Communications 13, nr 2 (31.03.2021): 15–36. http://dx.doi.org/10.5121/ijcnc.2021.13202.
Pełny tekst źródłaZafar, Sherin, i Neha Sharma. "Inculcating Trust in Hybrid Routing Approach for Securing MANET". International Journal of End-User Computing and Development 8, nr 2 (lipiec 2019): 18–28. http://dx.doi.org/10.4018/ijeucd.2019070102.
Pełny tekst źródłaBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam i Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review". International Journal of Electrical and Computer Engineering (IJECE) 11, nr 6 (1.12.2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Pełny tekst źródłaSohail, Hamza, Mahmood ul Hassan, M. A. Elmagzoub, Adel Rajab, Khairan Rajab, Adeel Ahmed, Asadullah Shaikh, Abid Ali i Harun Jamil. "BBSF: Blockchain-Based Secure Weather Forecasting Information through Routing Protocol in Vanet". Sensors 23, nr 11 (1.06.2023): 5259. http://dx.doi.org/10.3390/s23115259.
Pełny tekst źródłaYoo, Dae-Seung, Van Khoe Ta, Byung-Tae Jang i Hoon Oh. "An Energy-Efficien Slotted Sense Multiple Access Broadcast Protocol for Reliable Command Delivery in Dynamic Wireless Sensor Networks". Sensors 19, nr 5 (11.03.2019): 1236. http://dx.doi.org/10.3390/s19051236.
Pełny tekst źródłaSati, Salem, Ahmed Sohoud i Tareg Abulifa. "Energy Efficient Routing Protocol for Mobile Social Sensing Networks". Scalable Computing: Practice and Experience 20, nr 4 (4.12.2019): 641–51. http://dx.doi.org/10.12694/scpe.v20i4.1579.
Pełny tekst źródłaDaru, April Firman, Kristoko Dwi Hartomo i Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer". International Journal of Electrical and Computer Engineering (IJECE) 13, nr 5 (1.10.2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.
Pełny tekst źródłaAlzahrani, Ali, i Theyazn H. H. Aldhyani. "Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks". Electronics 11, nr 22 (21.11.2022): 3837. http://dx.doi.org/10.3390/electronics11223837.
Pełny tekst źródłaJočys, Linas Juozas. "ICMPV6 RA FLOODING VULNERABILITY RESEARCH / ICMPV6 PROTOKOLO RA ŽINUČIŲ ATSISAKYMO APTARNAUTI ATAKOS TYRIMAS". Mokslas – Lietuvos ateitis 8, nr 3 (29.06.2016): 273–77. http://dx.doi.org/10.3846/mla.2016.930.
Pełny tekst źródła