Статті в журналах з теми "Malicious node"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Malicious node".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Muruganandam, D., and J. Martin Leo Manickam. "Detection and Countermeasure of Packet Misrouting in Wireless Adhoc Networks." Sensor Letters 17, no. 9 (September 1, 2019): 696–700. http://dx.doi.org/10.1166/sl.2019.4127.
Повний текст джерелаBhardwaj, Indu, Sibaram Khara, and Priestly Shan. "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 451–62. http://dx.doi.org/10.12694/scpe.v21i3.1743.
Повний текст джерелаZhang, Zhao Hui, Ming Ming Hu, Dong Li, and Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.
Повний текст джерелаZhang, Zhiming, Yu Yang, Wei Yang, Fuying Wu, Ping Li, and Xiaoyong Xiong. "Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks." Security and Communication Networks 2021 (September 24, 2021): 1–12. http://dx.doi.org/10.1155/2021/9082570.
Повний текст джерелаSubramanian, Ananda Kumar, Aritra Samanta, Sasmithaa Manickam, Abhinav Kumar, Stavros Shiaeles, and Anand Mahendran. "Linear Regression Trust Management System for IoT Systems." Cybernetics and Information Technologies 21, no. 4 (December 1, 2021): 15–27. http://dx.doi.org/10.2478/cait-2021-0040.
Повний текст джерелаZhang, Bo, Qianqian Song, Tao Yang, Zhonghua Zheng, and Huan Zhang. "A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective." Mobile Information Systems 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/5185170.
Повний текст джерелаAlkhalidy, Muhsen, Atalla Fahed Al-Serhan, Ayoub Alsarhan, and Bashar Igried. "A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior." Future Internet 14, no. 8 (July 26, 2022): 223. http://dx.doi.org/10.3390/fi14080223.
Повний текст джерелаSivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (April 30, 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Повний текст джерелаAlsarhan, Ayoub, Abdel-Rahman Al-Ghuwairi, Esra'a Alshdaifat, Hasan Idhaim, and Omar Alkhawaldeh. "A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 03 (February 10, 2022): 136–50. http://dx.doi.org/10.3991/ijim.v16i03.27933.
Повний текст джерелаChen, Jing, Tong Li, and Rui Zhu. "Analysis of Malicious Node Identification Algorithm of Internet of Vehicles under Blockchain Technology: A Case Study of Intelligent Technology in Automotive Engineering." Applied Sciences 12, no. 16 (August 21, 2022): 8362. http://dx.doi.org/10.3390/app12168362.
Повний текст джерелаLi, Feng, Yali Si, Ning Lu, Zhen Chen, and Limin Shen. "A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/2761486.
Повний текст джерелаBhaskar .Ch, Vijaya, D. S. R. Murthy, and V. Kakulapati. "AODV (ST_AODV) on MANETs with Path Security and Trust-based Routing." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 11 (November 30, 2022): 01–06. http://dx.doi.org/10.17762/ijritcc.v10i11.5772.
Повний текст джерелаKumari, Shabnam, and Sumit Dalal. "Malicious Node Detection in WSN Using WTE." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2386–90. http://dx.doi.org/10.31142/ijtsrd14611.
Повний текст джерелаZheng, Guiping, Bei Gong, and Yu Zhang. "Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (February 27, 2021): 1–10. http://dx.doi.org/10.1155/2021/6667100.
Повний текст джерелаKaur, Kamaljit, and Amandeep Kaur. "Detection of Sybil Attack in VANETs." International Journal of Emerging Research in Management and Technology 6, no. 6 (June 29, 2018): 296. http://dx.doi.org/10.23956/ijermt.v6i6.285.
Повний текст джерелаTeng, Zhijun, Baohe Pang, Mingyang Sun, Luying Xie, and Liwen Guo. "Model for Malicious Node Recognition Based on Environmental Parameter Optimization and Time Reputation Sequence." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 38, no. 3 (June 2020): 634–42. http://dx.doi.org/10.1051/jnwpu/20203830634.
Повний текст джерелаA, Ganesan, and Kumar Kombaiya A. "Predicting Malicious Node Behavior in Wireless Network Using DSR Protocol and Network Metrics." International Journal of Computer Communication and Informatics 4, no. 1 (May 3, 2022): 1–10. http://dx.doi.org/10.34256/ijcci2211.
Повний текст джерелаYadav, G. Vidhisha, N. Ramanjaneya Reddy, and U. Sesadri. "Performance Analysis of Malicious nodes on Multi hop Cellular Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 7 (November 17, 2013): 2752–58. http://dx.doi.org/10.24297/ijct.v11i7.3473.
Повний текст джерелаDhingra, Madhavi, SC Jain, and Rakesh Singh Jadon. "Study on malicious node detection." Materials Today: Proceedings 29 (2020): 348–51. http://dx.doi.org/10.1016/j.matpr.2020.07.288.
Повний текст джерелаJamal, Tauseef, and Shariq Aziz Butt. "Malicious node analysis in MANETS." International Journal of Information Technology 11, no. 4 (April 20, 2018): 859–67. http://dx.doi.org/10.1007/s41870-018-0168-2.
Повний текст джерелаFarooq, Mohd Umar, Mohammad Pasha, Khaleel Ur Rahman Khan, and Mahboob Ul Haq Atif. "An Advanced Security and Data Integrity Protocol for Vehicular Ad-Hoc Networks." Advanced Materials Research 403-408 (November 2011): 994–1001. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.994.
Повний текст джерелаEt al., Dr S. Varalakshmi. "TRUST COMPUTATION USING BOTTOM-UP PARSER APPROACH IN MANET." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 18, 2021): 1236–41. http://dx.doi.org/10.17762/itii.v9i1.263.
Повний текст джерелаLakhani, Kanika. "A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (October 30, 2005): 489–94. http://dx.doi.org/10.24297/ijct.v4i2b2.3310.
Повний текст джерелаVamshi krishna, H., and Gandharba Swain. "Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 152. http://dx.doi.org/10.14419/ijet.v7i4.7.20533.
Повний текст джерелаChen, Miao, Bao Peng, and Liang Ma. "A New Security Localization Method for Detecting Malicious Beacon Nodes in Wireless Sensor Networks." Advanced Materials Research 186 (January 2011): 428–32. http://dx.doi.org/10.4028/www.scientific.net/amr.186.428.
Повний текст джерелаTrivedi, Munesh C., and Sachin Malhotra. "Identification and Prevention of Joint Gray Hole and Black Hole Attacks." International Journal of Ambient Computing and Intelligence 10, no. 2 (April 2019): 80–90. http://dx.doi.org/10.4018/ijaci.2019040106.
Повний текст джерелаZhang, Guanqun, Mengxi Liu, and Guangjun Zai. "A Blockchain-Based IoT Terminal Trust Mechanism Management Scheme." Journal of Physics: Conference Series 2404, no. 1 (December 1, 2022): 012049. http://dx.doi.org/10.1088/1742-6596/2404/1/012049.
Повний текст джерелаShi, Qiong, Li Qin, Yinghua Ding, Boli Xie, Jiajie Zheng, and Lipeng Song. "Information-Aware Secure Routing in Wireless Sensor Networks." Sensors 20, no. 1 (December 26, 2019): 165. http://dx.doi.org/10.3390/s20010165.
Повний текст джерелаHarwahyu, Ruki, Boma A. Adhi, Harris Simaremare, Abdusy Syarif, Riri F. Sari, and Pascal Lorenz. "AODV-UI with Malicious Node Detection and Removal for Public MANET." Journal of Communications Software and Systems 8, no. 4 (December 21, 2012): 110. http://dx.doi.org/10.24138/jcomss.v8i4.165.
Повний текст джерелаYue-e, Yi. "Security of the Internet of Things Based on Game Algorithm." International Journal of Online Engineering (iJOE) 14, no. 08 (August 30, 2018): 80. http://dx.doi.org/10.3991/ijoe.v14i08.9178.
Повний текст джерелаZougagh, Hicham, Noureddine Idboufker, Rida Zoubairi, and Rachid El Ayachi. "Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems." International Journal of Business Data Communications and Networking 15, no. 2 (July 2019): 73–91. http://dx.doi.org/10.4018/ijbdcn.2019070105.
Повний текст джерелаHu, Xiang Dong, and Peng Qin Yu. "Detection of False Data Injection Attack in the Internet of Things." Advanced Materials Research 452-453 (January 2012): 932–36. http://dx.doi.org/10.4028/www.scientific.net/amr.452-453.932.
Повний текст джерелаFadli, Khafidzun, Achmad Basuki, and Eko Setiawan. "Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 3 (May 22, 2020): 591. http://dx.doi.org/10.25126/jtiik.2020733339.
Повний текст джерелаYu, Xiaosheng, Jie Qin, and Peng Chen. "GPBFT: A Practical Byzantine Fault-Tolerant Consensus Algorithm Based on Dual Administrator Short Group Signatures." Security and Communication Networks 2022 (August 5, 2022): 1–11. http://dx.doi.org/10.1155/2022/8311821.
Повний текст джерелаPalani, Saravanan, Logesh Ravi, Vijayakumar Varadarajan, Subramaniyaswamy Vairavasundaram, and Xiao-Zhi Gao. "Malicious Route Detection in Vehicular Ad-hoc Network using Geographic Routing with Masked Data." Recent Advances in Computer Science and Communications 13, no. 3 (August 12, 2020): 319–25. http://dx.doi.org/10.2174/2213275912666181205150739.
Повний текст джерелаAtassi, Alaa, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi. "Decentralised malicious node detection in WSN." International Journal of Space-Based and Situated Computing 4, no. 1 (2014): 15. http://dx.doi.org/10.1504/ijssc.2014.060685.
Повний текст джерелаChen, Zuo, Min He, Wei Liang, and Kai Chen. "Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network." Journal of Sensors 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/716468.
Повний текст джерелаKong, Wenping, Xiaoyong Li, Liyang Hou, and Yanrong Li. "An Efficient and Credible Multi-Source Trust Fusion Mechanism Based on Time Decay for Edge Computing." Electronics 9, no. 3 (March 19, 2020): 502. http://dx.doi.org/10.3390/electronics9030502.
Повний текст джерелаSaha, Himadri Nath, Rohit Singh, Debika Bhattacharyya, and P. K. Banerjee. "Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network." Foundations of Computing and Decision Sciences 40, no. 4 (December 1, 2015): 267–98. http://dx.doi.org/10.1515/fcds-2015-0016.
Повний текст джерелаMalviya, Taruna, and Khushboo Sawant. "Impact of Vampire Attack on Performance of Wireless Sensor Networks: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 96. http://dx.doi.org/10.23956/ijarcsse.v7i8.31.
Повний текст джерелаWei, Dengfeng, and Qing-Ju Jiao. "A Novel Core-Peer Based Trust Model for Peer-to-Peer Networks." Journal of Computational and Theoretical Nanoscience 14, no. 1 (January 1, 2017): 114–18. http://dx.doi.org/10.1166/jctn.2017.6135.
Повний текст джерелаFabrice, Sibomana. "DETECTIONAND PREVENTIONOF MALICIOUS NODE BASED ON NODE BEHAVIOUR IN MANET." International Journal of Advanced Research in Computer Science 8, no. 9 (September 30, 2017): 774–77. http://dx.doi.org/10.26483/ijarcs.v8i9.5213.
Повний текст джерелаLiu, Yi, Ruihui Zhao, Jiawen Kang, Abdulsalam Yassine, Dusit Niyato, and Jialiang Peng. "Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things." ACM Transactions on Internet Technology 22, no. 3 (August 31, 2022): 1–22. http://dx.doi.org/10.1145/3453169.
Повний текст джерелаRehman, Eid, Muhammad Sher, Syed Hussnain Abbas Naqvi, Khan Badar Khan, and Kamran Ullah. "Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network." Journal of Computer Networks and Communications 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/1630673.
Повний текст джерелаAranganathan, A., and C. D. Suriyakala. "Intelligent agents based trusted revocation for securing clustering MANETS." APTIKOM Journal on Computer Science and Information Technologies 3, no. 1 (January 22, 2020): 1–5. http://dx.doi.org/10.34306/csit.v3i1.75.
Повний текст джерелаAranganathan, A., and C. D. Suriyakala. "Intelligent agents based trusted revocation for securing clustering MANETS." APTIKOM Journal on Computer Science and Information Technologies 3, no. 1 (March 1, 2018): 1–5. http://dx.doi.org/10.11591/aptikom.j.csit.79.
Повний текст джерелаZhao, Junwei, and Xi Chen. "An Opinion Evolution Model Based on Heterogeneous Benefit with Malicious Nodes Added." Complexity 2021 (April 16, 2021): 1–9. http://dx.doi.org/10.1155/2021/6642698.
Повний текст джерелаSu, Zhen Zhen, Er Kun Sun, Xiao Gang Qi, Ying Nie, Wei Hong Lin, and Man De Xie. "A Security Routing Protocol Based on Convergence Degree and Trust." Applied Mechanics and Materials 519-520 (February 2014): 155–59. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.155.
Повний текст джерелаO., Amusan, Thompson A. F., Aderinola T. B., and Alese B. K. "Modelling Malicious Attack in Social Networks." Network and Communication Technologies 5, no. 1 (February 6, 2020): 37. http://dx.doi.org/10.5539/nct.v5n1p37.
Повний текст джерелаAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Повний текст джерела