Статті в журналах з теми "FLOODING CONTROL PROTOCOL"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "FLOODING CONTROL PROTOCOL".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy, and Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks." Electronics 10, no. 18 (September 16, 2021): 2274. http://dx.doi.org/10.3390/electronics10182274.
Повний текст джерелаZHANG, YING, and MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (December 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.
Повний текст джерелаTang, Churan, and Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding." ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.
Повний текст джерелаSingh, Prabhdeep, Anuj Kumar Gupta, and Ravinder Singh. "Improved priority-based data aggregation congestion control protocol." Modern Physics Letters B 34, no. 02 (December 20, 2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.
Повний текст джерелаAl-Shihri, Fatima, and Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks." International Journal on Semantic Web and Information Systems 13, no. 2 (April 2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.
Повний текст джерелаPrabhu. M, Mr Dinesh, and Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach." International Journal of Engineering and Computer Science 10, no. 12 (December 15, 2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.
Повний текст джерелаShams Shafigh, Alireza, Kamran Abdollahi, and Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol." Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.
Повний текст джерелаDey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (November 19, 2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.
Повний текст джерелаChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen, and Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Повний текст джерелаElejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, and Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks." Applied Sciences 12, no. 12 (June 16, 2022): 6150. http://dx.doi.org/10.3390/app12126150.
Повний текст джерелаTung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (August 1, 2020): 1239. http://dx.doi.org/10.3390/electronics9081239.
Повний текст джерелаTun, Thazin. "A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark." Transactions on Networks and Communications 8, no. 3 (June 30, 2020): 08–15. http://dx.doi.org/10.14738/tnc.83.8250.
Повний текст джерелаPai H., Aditya, Khalid K. Almuzaini, Liaqat Ali, Ashir Javeed, Bhasker Pant, Piyush Kumar Pareek, and Reynah Akwafo. "Delay-Driven Opportunistic Routing with Multichannel Cooperative Neighbor Discovery for Industry 4.0 Wireless Networks Based on Power and Load Awareness." Wireless Communications and Mobile Computing 2022 (April 4, 2022): 1–12. http://dx.doi.org/10.1155/2022/5256133.
Повний текст джерелаOnyema, Edeh Michael, M. Anand Kumar, Sundaravadivazhagn Balasubaramanian, Salil Bharany, Ateeq Ur Rehman, Elsayed Tag Eldin, and Muhammad Shafiq. "A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks." Sustainability 14, no. 19 (September 22, 2022): 11950. http://dx.doi.org/10.3390/su141911950.
Повний текст джерелаNam, Youngju, Hyunseok Choi, Yongje Shin, Soochang Park, and Euisin Lee. "Expected Area-Based Real-Time Routing Protocol for Supporting Mobile Sinks in Wireless Sensor Networks." Electronics 11, no. 20 (October 17, 2022): 3350. http://dx.doi.org/10.3390/electronics11203350.
Повний текст джерелаSingh, Jaspreet, Gurpreet Singh, Deepali Gupta, Ghulam Muhammad, and Ali Nauman. "OCI-OLSR: An Optimized Control Interval-Optimized Link State Routing-Based Efficient Routing Mechanism for Ad-Hoc Networks." Processes 11, no. 5 (May 8, 2023): 1419. http://dx.doi.org/10.3390/pr11051419.
Повний текст джерелаJing, Chun Guo, and Jun Wei Wang. "Simulation of Street Light Pole Controller Routing with OMNeT++." Applied Mechanics and Materials 401-403 (September 2013): 1976–80. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1976.
Повний текст джерелаBaba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Повний текст джерелаPrabhavat, Sumet, Worrawat Narongkhachavana, Thananop Thongthavorn, and Chanakan Phankaew. "Low Overhead Localized Routing in Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2019 (September 22, 2019): 1–15. http://dx.doi.org/10.1155/2019/9652481.
Повний текст джерелаGuo, Weizhen, Min Zhu, Bo Yang, Yanbo Wu, and Xinguo Li. "Design of a Self-Organizing Routing Protocol for Underwater Wireless Sensor Networks Based on Location and Energy Information." Journal of Marine Science and Engineering 11, no. 8 (August 19, 2023): 1620. http://dx.doi.org/10.3390/jmse11081620.
Повний текст джерелаShin, Byoungheon, and Dongman Lee. "An Efficient Local Repair-Based Multi-Constrained Routing for Congestion Control in Wireless Mesh Networks." Wireless Communications and Mobile Computing 2018 (November 14, 2018): 1–17. http://dx.doi.org/10.1155/2018/2893494.
Повний текст джерелаHsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung, and YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor." Sensors 21, no. 6 (March 11, 2021): 1980. http://dx.doi.org/10.3390/s21061980.
Повний текст джерелаLiu, Hao Fan, and Ping Li. "An Approach on Optimization of ZigBee Network Routing Algorithm." Applied Mechanics and Materials 347-350 (August 2013): 1987–91. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1987.
Повний текст джерелаAkinsolu, Mobayode O., Abimbola O. Sangodoyin, and Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis." Mathematics 10, no. 14 (July 21, 2022): 2536. http://dx.doi.org/10.3390/math10142536.
Повний текст джерелаKim, Daehee, Sejun Song, and Baek-Young Choi. "Energy-Efficient Adaptive Geosource Multicast Routing for Wireless Sensor Networks." Journal of Sensors 2013 (2013): 1–14. http://dx.doi.org/10.1155/2013/142078.
Повний текст джерелаMueller, Andrew, Anthony Thomas, Jeffrey Brown, Abram Young, Kim Smith, Roxanne Connelly, and Stephanie L. Richards. "Geographic information system protocol for mapping areas targeted for mosquito control in North Carolina." PLOS ONE 18, no. 3 (March 24, 2023): e0278253. http://dx.doi.org/10.1371/journal.pone.0278253.
Повний текст джерелаYamazaki, Satoshi, Yu Abiko, and Hideki Mizuno. "A Simple and Energy-Efficient Flooding Scheme for Wireless Routing." Wireless Communications and Mobile Computing 2020 (August 20, 2020): 1–9. http://dx.doi.org/10.1155/2020/8832602.
Повний текст джерелаKim, Jaebeom, Byung-Seok Park, and Yong-up Park. "Flooding Message Mitigation of Wireless Content Centric Networking for Last-Mile Smart-Grid." Applied Sciences 9, no. 19 (September 23, 2019): 3978. http://dx.doi.org/10.3390/app9193978.
Повний текст джерелаPark, Sang-Hyun, Seungryong Cho, and Jung-Ryun Lee. "Energy-Efficient Probabilistic Routing Algorithm for Internet of Things." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/213106.
Повний текст джерелаKhan, Fawad Ali, Rafidah Md Noor, Miss Laiha Mat Kiah, Ismail Ahmedy, Mohd Yamani, Tey Kok Soon, and Muneer Ahmad. "Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things." Sensors 20, no. 1 (January 3, 2020): 283. http://dx.doi.org/10.3390/s20010283.
Повний текст джерелаAlasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.
Повний текст джерелаRani, Shalli, Deepika Koundal, Kavita, Muhammad Fazal Ijaz, Mohamed Elhoseny, and Mohammed I. Alghamdi. "An Optimized Framework for WSN Routing in the Context of Industry 4.0." Sensors 21, no. 19 (September 28, 2021): 6474. http://dx.doi.org/10.3390/s21196474.
Повний текст джерелаKhalid, Khuram, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh, and Leonard Barolli. "A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks." Journal of High Speed Networks 27, no. 1 (March 29, 2021): 1–12. http://dx.doi.org/10.3233/jhs-210648.
Повний текст джерелаJavaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq, and T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks." Mathematical Problems in Engineering 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/105245.
Повний текст джерелаJavaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq, and T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks." Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/105245.
Повний текст джерелаRouissat, Mehdi, Mohammed Belkheir, and Hichem Sid Ahmed Belkhira. "A potential flooding version number attack against RPL based IOT networks." Journal of Electrical Engineering 73, no. 4 (August 1, 2022): 267–75. http://dx.doi.org/10.2478/jee-2022-0035.
Повний текст джерелаKim, Taeguen, Jiyoon Kim, and Ilsun You. "An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network." Electronics 12, no. 17 (August 22, 2023): 3543. http://dx.doi.org/10.3390/electronics12173543.
Повний текст джерелаLatah, Majd, and Levent Toker. "A novel intelligent approach for detecting DoS flooding attacks in software-defined networks." International Journal of Advances in Intelligent Informatics 4, no. 1 (March 31, 2018): 11. http://dx.doi.org/10.26555/ijain.v4i1.138.
Повний текст джерелаSamal, Chandra Kanta. "Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks." International journal of Computer Networks & Communications 15, no. 2 (March 30, 2023): 22–38. http://dx.doi.org/10.5121/ijcnc.2023.15202.
Повний текст джерелаLogie, Carmen H., Danielle Toccalino, Anna Cooper Reed, Kalonde Malama, Peter A. Newman, Sheri Weiser, Orlando Harris, Isha Berry, and Adebola Adedimeji. "Exploring linkages between climate change and sexual health: a scoping review protocol." BMJ Open 11, no. 10 (October 2021): e054720. http://dx.doi.org/10.1136/bmjopen-2021-054720.
Повний текст джерелаJamil, Harun, Abid Ali, and Faisal Jamil. "Spoofing Attack Mitigation in Address Resolution Protocol (ARP) and DDoS in Software-Defined Networking." Journal of Information Security and Cybercrimes Research 5, no. 1 (June 30, 2022): 31–42. http://dx.doi.org/10.26735/vbvs3993.
Повний текст джерелаKumar Pallai, Gyanendra, Meenakshi Sankaran, and Amiya Kumar Rath. "Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET." International journal of Computer Networks & Communications 13, no. 2 (March 31, 2021): 15–36. http://dx.doi.org/10.5121/ijcnc.2021.13202.
Повний текст джерелаZafar, Sherin, and Neha Sharma. "Inculcating Trust in Hybrid Routing Approach for Securing MANET." International Journal of End-User Computing and Development 8, no. 2 (July 2019): 18–28. http://dx.doi.org/10.4018/ijeucd.2019070102.
Повний текст джерелаBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam, and Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Повний текст джерелаSohail, Hamza, Mahmood ul Hassan, M. A. Elmagzoub, Adel Rajab, Khairan Rajab, Adeel Ahmed, Asadullah Shaikh, Abid Ali, and Harun Jamil. "BBSF: Blockchain-Based Secure Weather Forecasting Information through Routing Protocol in Vanet." Sensors 23, no. 11 (June 1, 2023): 5259. http://dx.doi.org/10.3390/s23115259.
Повний текст джерелаYoo, Dae-Seung, Van Khoe Ta, Byung-Tae Jang, and Hoon Oh. "An Energy-Efficien Slotted Sense Multiple Access Broadcast Protocol for Reliable Command Delivery in Dynamic Wireless Sensor Networks." Sensors 19, no. 5 (March 11, 2019): 1236. http://dx.doi.org/10.3390/s19051236.
Повний текст джерелаSati, Salem, Ahmed Sohoud, and Tareg Abulifa. "Energy Efficient Routing Protocol for Mobile Social Sensing Networks." Scalable Computing: Practice and Experience 20, no. 4 (December 4, 2019): 641–51. http://dx.doi.org/10.12694/scpe.v20i4.1579.
Повний текст джерелаDaru, April Firman, Kristoko Dwi Hartomo, and Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (October 1, 2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.
Повний текст джерелаAlzahrani, Ali, and Theyazn H. H. Aldhyani. "Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks." Electronics 11, no. 22 (November 21, 2022): 3837. http://dx.doi.org/10.3390/electronics11223837.
Повний текст джерелаJočys, Linas Juozas. "ICMPV6 RA FLOODING VULNERABILITY RESEARCH / ICMPV6 PROTOKOLO RA ŽINUČIŲ ATSISAKYMO APTARNAUTI ATAKOS TYRIMAS." Mokslas – Lietuvos ateitis 8, no. 3 (June 29, 2016): 273–77. http://dx.doi.org/10.3846/mla.2016.930.
Повний текст джерела