Found: 60
Select item for more details and to access through your institution.
A novel technique for flit traversal in network-on-chip router.
- Published in:
- Computing, 2023, v. 105, n. 12, p. 2647, doi. 10.1007/s00607-023-01200-x
- By:
- Publication type:
- Article
Wormhole Attack Detection in RPL-Protocol based on RSSI Value.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 4976
- By:
- Publication type:
- Article
Hybrid model for Protocol Independent Secure Video Transmission using improvised OSLR with optimized MPR and DYDOG.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 2, p. 1669
- By:
- Publication type:
- Article
Design of a high speed router for NOC.
- Published in:
- Modern Physics Letters B, 2021, v. 35, n. 27, p. 1, doi. 10.1142/S0217984921400121
- By:
- Publication type:
- Article
VIRTUAL CHANNEL AWARE SCHEDULING FOR REAL TIME DATA-FLOWS ON NETWORK ON-CHIP.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 3, p. 495, doi. 10.12694/scpe.v20i3.1423
- By:
- Publication type:
- Article
Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 4, p. 1561, doi. 10.1007/s11277-019-06160-0
- By:
- Publication type:
- Article
Isolation of Wormhole Attackers in IOV Using WPWP Packet.
- Published in:
- Revue d'Intelligence Artificielle, 2019, v. 33, n. 1, p. 9, doi. 10.18280/ria.330102
- By:
- Publication type:
- Article
Existence of wormhole supported by the Einasto density profile.
- Published in:
- Canadian Journal of Physics, 2018, v. 96, n. 11, p. 1242, doi. 10.1139/cjp-2017-0524
- By:
- Publication type:
- Article
AnyNoC: new network on a chip switching using the shared-memory and output-queue techniques for complex Internet of things systems.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 9, p. 4470, doi. 10.1007/s11227-017-2035-5
- By:
- Publication type:
- Article
Security DV-hop localisation algorithm against wormhole attack in wireless sensor network.
- Published in:
- IET Wireless Sensor Systems (Wiley-Blackwell), 2018, v. 8, n. 2, p. 68, doi. 10.1049/iet-wss.2017.0075
- By:
- Publication type:
- Article
Wormhole Attack Detection Technique in Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 2, p. 2939, doi. 10.1007/s11277-017-4643-z
- By:
- Publication type:
- Article
COLLUSION BW HOLE ATTACK.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 9, p. 496, doi. 10.26483/ijarcs.v8i9.5054
- By:
- Publication type:
- Article
Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 1, p. 859, doi. 10.1007/s11277-017-4541-4
- By:
- Publication type:
- Article
Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks.
- Published in:
- Wireless Networks (10220038), 2017, v. 23, n. 6, p. 1709, doi. 10.1007/s11276-016-1240-0
- By:
- Publication type:
- Article
Thin-shell wormholes in neo-Newtonian theory.
- Published in:
- Modern Physics Letters A, 2017, v. 32, n. 23, p. -1, doi. 10.1142/S021773231750119X
- By:
- Publication type:
- Article
AN EFFICIENT APPROACH FOR ELIMINATING THE SYBIL, SINKHOLE AND WORMHOLE ATTACK IN WSN.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 1212, doi. 10.26483/ijarcs.v8i7.4598
- By:
- Publication type:
- Article
Analysis of AODV and OLSR Routing Protocol Under Wormhole Attack.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1724
- By:
- Publication type:
- Article
Noncommutative wormhole solutions in F( T, T) gravity.
- Published in:
- Modern Physics Letters A, 2017, v. 32, n. 13, p. -1, doi. 10.1142/S0217732317500833
- By:
- Publication type:
- Article
Detection of wormhole attacks on IPv6 mobility-based wireless sensor network.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13638-016-0776-0
- By:
- Publication type:
- Article
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4596, doi. 10.1002/sec.1652
- By:
- Publication type:
- Article
Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network.
- Published in:
- Journal of Computer Networks & Communications, 2016, p. 1, doi. 10.1155/2016/3405264
- By:
- Publication type:
- Article
Gravitational Microlensing by Ellis Wormhole: Second Order Effects.
- Published in:
- International Journal of Theoretical Physics, 2016, v. 55, n. 11, p. 4723, doi. 10.1007/s10773-016-3095-7
- By:
- Publication type:
- Article
ZONE BASED PATH ROUTING APPROACH FOR THE DETECTION AND PREVENTION OF MALICIOUS BEHAVIOUR OF THE NODE IN MANET.
- Published in:
- ICTACT Journal on Communication Technology, 2016, v. 7, n. 3, p. 1356
- By:
- Publication type:
- Article
Trunk Wormhole Detection using Bio-Impedance Spectroscopy Measurements: A Feasibility Study.
- Published in:
- International Journal of Simulation -- Systems, Science & Technology, 2016, v. 17, n. 21, p. 23.1, doi. 10.5013/IJSSST.a.17.27.23
- By:
- Publication type:
- Article
An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack.
- Published in:
- Mehran University Research Journal of Engineering & Technology, 2016, v. 35, n. 3, p. 359, doi. 10.22581/muet1982.1603.06
- By:
- Publication type:
- Article
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 5, p. 420, doi. 10.1002/sec.766
- By:
- Publication type:
- Article
The Improved Overhearing Backup AODV Protocol in MANET.
- Published in:
- Journal of Computer Networks & Communications, 2016, p. 1, doi. 10.1155/2016/6463157
- By:
- Publication type:
- Article
Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, p. 1, doi. 10.1155/2015/356382
- By:
- Publication type:
- Article
On providing wormhole-attack-resistant localization using conflicting sets.
- Published in:
- Wireless Communications & Mobile Computing, 2015, v. 15, n. 15, p. 1865, doi. 10.1002/wcm.2462
- By:
- Publication type:
- Article
MDS-WLAN: Maximal Data Security in WLAN for Resisting Potential Threats.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2015, v. 5, n. 4, p. 859
- By:
- Publication type:
- Article
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices.
- Published in:
- Electronic Commerce Research, 2015, v. 15, n. 1, p. 75, doi. 10.1007/s10660-014-9167-y
- By:
- Publication type:
- Article
Distributed Wormhole Detection Algorithm for Wireless Sensor Network.
- Published in:
- International Review on Computers & Software, 2015, v. 10, n. 3, p. 308, doi. 10.15866/irecos.v10i3.5624
- By:
- Publication type:
- Article
Tunnelling with wormhole creation.
- Published in:
- Journal of Experimental & Theoretical Physics, 2015, v. 120, n. 3, p. 460, doi. 10.1134/S1063776115030139
- By:
- Publication type:
- Article
DEFENDING AGAINST WORMHOLE ATTACK IN MULTI-HOP WIRELESS MESH NETWORKS.
- Published in:
- Annals. Computer Science Series, 2014, v. 12, n. 2, p. 39
- By:
- Publication type:
- Article
Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2442, doi. 10.1002/sec.955
- By:
- Publication type:
- Article
An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1127, doi. 10.2298/CSIS130921068W
- By:
- Publication type:
- Article
Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1292, doi. 10.1002/sec.1023
- By:
- Publication type:
- Article
Characterization of flow parameters and evidence of pore clogging during limestone dissolution experiments.
- Published in:
- Water Resources Research, 2014, v. 50, n. 8, p. 6305, doi. 10.1002/2013WR015193
- By:
- Publication type:
- Article
A Two-Phase Wormhole Attack Detection Scheme in MANETs.
- Published in:
- ISeCure, 2014, v. 6, n. 2, p. 183
- By:
- Publication type:
- Article
A Review on Attacks in MANET.
- Published in:
- International Journal of Computer Science & Management Studies, 2014, v. 14, n. 6, p. 104
- By:
- Publication type:
- Article
Analysis of Fault Tolerance in Hypercube.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 4, p. 101
- By:
- Publication type:
- Article
Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/910242
- By:
- Publication type:
- Article
Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 4, p. 2519, doi. 10.1007/s11277-013-1163-3
- By:
- Publication type:
- Article
A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology.
- Published in:
- Electronic Commerce Research, 2013, v. 13, n. 3, p. 329, doi. 10.1007/s10660-013-9122-3
- By:
- Publication type:
- Article
A Comparison Of Wormhole Detection Methods in MANETS.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 3, p. 200
- By:
- Publication type:
- Article
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm.
- Published in:
- Sensors (14248220), 2013, v. 13, n. 5, p. 6651, doi. 10.3390/s130506651
- By:
- Publication type:
- Article
A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/184931
- By:
- Publication type:
- Article
Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 1, p. 58, doi. 10.1002/sec.530
- By:
- Publication type:
- Article
Detecting and Preventing Wormhole Attacks in Wireless Sensor Networks using Secure Routing Algorithms.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 354
- By:
- Publication type:
- Article
Simulation experiment and analysis of acid wormhole in dolomite.
- Published in:
- Chemical Engineering of Oil & Gas / Shi You Yu Tian Ran Qi Hua Gong, 2012, v. 40, n. 1, p. 66, doi. 10.3969/j.issn.1007-3426.2012.01.014
- By:
- Publication type:
- Article