Works matching DE "WORMHOLE routing"
Results: 66
Tunnelling with wormhole creation.
- Published in:
- Journal of Experimental & Theoretical Physics, 2015, v. 120, n. 3, p. 460, doi. 10.1134/S1063776115030139
- By:
- Publication type:
- Article
Distributed Wormhole Detection Algorithm for Wireless Sensor Network.
- Published in:
- International Review on Computers & Software, 2015, v. 10, n. 3, p. 308, doi. 10.15866/irecos.v10i3.5624
- By:
- Publication type:
- Article
Security DV-hop localisation algorithm against wormhole attack in wireless sensor network.
- Published in:
- IET Wireless Sensor Systems (Wiley-Blackwell), 2018, v. 8, n. 2, p. 68, doi. 10.1049/iet-wss.2017.0075
- By:
- Publication type:
- Article
Isolation of Wormhole Attackers in IOV Using WPWP Packet.
- Published in:
- Revue d'Intelligence Artificielle, 2019, v. 33, n. 1, p. 9, doi. 10.18280/ria.330102
- By:
- Publication type:
- Article
Balancing Traffic Load for Multi-Node Multicast in a Wormhole 2-D Torus/Mesh.
- Published in:
- Computer Journal, 2001, v. 44, n. 5, p. 354, doi. 10.1093/comjnl/44.5.354
- By:
- Publication type:
- Article
A Two-Phase Wormhole Attack Detection Scheme in MANETs.
- Published in:
- ISeCure, 2014, v. 6, n. 2, p. 183
- By:
- Publication type:
- Article
An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1127, doi. 10.2298/CSIS130921068W
- By:
- Publication type:
- Article
Trunk Wormhole Detection using Bio-Impedance Spectroscopy Measurements: A Feasibility Study.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 21, p. 23.1, doi. 10.5013/IJSSST.a.17.27.23
- By:
- Publication type:
- Article
Defending against Wormhole Attack in MANET Using an Artificial Immune System.
- Published in:
- New Review of Information Networking, 2016, v. 21, n. 2, p. 79, doi. 10.1080/13614576.2016.1247741
- By:
- Publication type:
- Article
VIRTUAL CHANNEL AWARE SCHEDULING FOR REAL TIME DATA-FLOWS ON NETWORK ON-CHIP.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 3, p. 495, doi. 10.12694/scpe.v20i3.1423
- By:
- Publication type:
- Article
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2010, p. 1, doi. 10.1155/2010/627039
- By:
- Publication type:
- Article
Characterization of flow parameters and evidence of pore clogging during limestone dissolution experiments.
- Published in:
- Water Resources Research, 2014, v. 50, n. 8, p. 6305, doi. 10.1002/2013WR015193
- By:
- Publication type:
- Article
Deadlock Detection and Recovery for True Fully Adaptive Routing in Regular Wormhole Networks.
- Published in:
- Journal of Information Science & Engineering, 2009, v. 25, n. 2, p. 465
- By:
- Publication type:
- Article
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices.
- Published in:
- Electronic Commerce Research, 2015, v. 15, n. 1, p. 75, doi. 10.1007/s10660-014-9167-y
- By:
- Publication type:
- Article
ZONE BASED PATH ROUTING APPROACH FOR THE DETECTION AND PREVENTION OF MALICIOUS BEHAVIOUR OF THE NODE IN MANET.
- Published in:
- ICTACT Journal on Communication Technology, 2016, v. 7, n. 3, p. 1356
- By:
- Publication type:
- Article
MDS-WLAN: Maximal Data Security in WLAN for Resisting Potential Threats.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2015, v. 5, n. 4, p. 859
- By:
- Publication type:
- Article
A novel technique for flit traversal in network-on-chip router.
- Published in:
- Computing, 2023, v. 105, n. 12, p. 2647, doi. 10.1007/s00607-023-01200-x
- By:
- Publication type:
- Article
Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 4, p. 1561, doi. 10.1007/s11277-019-06160-0
- By:
- Publication type:
- Article
Wormhole Attack Detection Technique in Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 2, p. 2939, doi. 10.1007/s11277-017-4643-z
- By:
- Publication type:
- Article
Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 1, p. 859, doi. 10.1007/s11277-017-4541-4
- By:
- Publication type:
- Article
On-chip Networks!
- Published in:
- IETE Technical Review, 2013, v. 30, n. 3, p. 168, doi. 10.4103/0256-4602.113467
- By:
- Publication type:
- Article
System-level Buffer Allocation for Application Specific Network-on-chip with Wormhole Routing.
- Published in:
- IETE Technical Review, 2012, v. 29, n. 6, p. 482, doi. 10.4103/0256-4602.105004
- By:
- Publication type:
- Article
A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks.
- Published in:
- IETE Technical Review, 2011, v. 28, n. 2, p. 89, doi. 10.4103/0256-4602.78089
- By:
- Publication type:
- Article
Design of a high speed router for NOC.
- Published in:
- Modern Physics Letters B, 2021, v. 35, n. 27, p. 1, doi. 10.1142/S0217984921400121
- By:
- Publication type:
- Article
Simulation experiment and analysis of acid wormhole in dolomite.
- Published in:
- Chemical Engineering of Oil & Gas / Shi You Yu Tian Ran Qi Hua Gong, 2012, v. 40, n. 1, p. 66, doi. 10.3969/j.issn.1007-3426.2012.01.014
- By:
- Publication type:
- Article
Intelligent intrusion detection in external communication systems for autonomous vehicles.
- Published in:
- Systems Science & Control Engineering, 2018, v. 6, n. 1, p. 48, doi. 10.1080/21642583.2018.1440260
- By:
- Publication type:
- Article
Hamiltonian cycles in hypercubes with more faulty edges.
- Published in:
- International Journal of Computer Mathematics, 2017, v. 94, n. 6, p. 1155, doi. 10.1080/00207160.2016.1184261
- By:
- Publication type:
- Article
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4596, doi. 10.1002/sec.1652
- By:
- Publication type:
- Article
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 5, p. 420, doi. 10.1002/sec.766
- By:
- Publication type:
- Article
Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2442, doi. 10.1002/sec.955
- By:
- Publication type:
- Article
Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1292, doi. 10.1002/sec.1023
- By:
- Publication type:
- Article
Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 1, p. 58, doi. 10.1002/sec.530
- By:
- Publication type:
- Article
End-to-end protocol to secure ad hoc networks against wormhole attacks.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 9, p. 994, doi. 10.1002/sec.272
- By:
- Publication type:
- Article
COLLUSION BW HOLE ATTACK.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 9, p. 496, doi. 10.26483/ijarcs.v8i9.5054
- By:
- Publication type:
- Article
AN EFFICIENT APPROACH FOR ELIMINATING THE SYBIL, SINKHOLE AND WORMHOLE ATTACK IN WSN.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 1212, doi. 10.26483/ijarcs.v8i7.4598
- By:
- Publication type:
- Article
Analysis of AODV and OLSR Routing Protocol Under Wormhole Attack.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1724
- By:
- Publication type:
- Article
Analysis of Fault Tolerance in Hypercube.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 4, p. 101
- By:
- Publication type:
- Article
A Comparison Of Wormhole Detection Methods in MANETS.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 3, p. 200
- By:
- Publication type:
- Article
Detecting and Preventing Wormhole Attacks in Wireless Sensor Networks using Secure Routing Algorithms.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 354
- By:
- Publication type:
- Article
Gravitational Microlensing by Ellis Wormhole: Second Order Effects.
- Published in:
- International Journal of Theoretical Physics, 2016, v. 55, n. 11, p. 4723, doi. 10.1007/s10773-016-3095-7
- By:
- Publication type:
- Article
Wormhole Attack Detection in RPL-Protocol based on RSSI Value.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 4976
- By:
- Publication type:
- Article
Hybrid model for Protocol Independent Secure Video Transmission using improvised OSLR with optimized MPR and DYDOG.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 2, p. 1669
- By:
- Publication type:
- Article
DEFENDING AGAINST WORMHOLE ATTACK IN MULTI-HOP WIRELESS MESH NETWORKS.
- Published in:
- Annals. Computer Science Series, 2014, v. 12, n. 2, p. 39
- By:
- Publication type:
- Article
Thin-shell wormholes in neo-Newtonian theory.
- Published in:
- Modern Physics Letters A, 2017, v. 32, n. 23, p. -1, doi. 10.1142/S021773231750119X
- By:
- Publication type:
- Article
Noncommutative wormhole solutions in F( T, T) gravity.
- Published in:
- Modern Physics Letters A, 2017, v. 32, n. 13, p. -1, doi. 10.1142/S0217732317500833
- By:
- Publication type:
- Article
Existence of wormhole supported by the Einasto density profile.
- Published in:
- Canadian Journal of Physics, 2018, v. 96, n. 11, p. 1242, doi. 10.1139/cjp-2017-0524
- By:
- Publication type:
- Article
On Asymptotic Analysis of Packet and Wormhole Switched Routing Algorithm for Application-Specific Networks-on-Chip.
- Published in:
- Journal of Electrical & Computer Engineering, 2012, p. 1, doi. 10.1155/2012/216406
- By:
- Publication type:
- Article
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm.
- Published in:
- Sensors (14248220), 2013, v. 13, n. 5, p. 6651, doi. 10.3390/s130506651
- By:
- Publication type:
- Article
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET.
- Published in:
- Sensors (14248220), 2009, v. 9, n. 6, p. 5022, doi. 10.3390/s90605022
- By:
- Publication type:
- Article
AnyNoC: new network on a chip switching using the shared-memory and output-queue techniques for complex Internet of things systems.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 9, p. 4470, doi. 10.1007/s11227-017-2035-5
- By:
- Publication type:
- Article