Results 181 to 190 of about 1,052 (226)
Traffic classification in SDN-based IoT network using two-level fused network with self-adaptive manta ray foraging. [PDF]
Aleisa MA.
europepmc +1 more source
Effects of Dislocation Filtering Layers on Optical Properties of Third Telecom Window Emitting InAs/InGaAlAs Quantum Dots Grown on Silicon Substrates. [PDF]
Rudno-Rudziński W +10 more
europepmc +1 more source
Tropical cyclones drive oxygen minimum zone shoaling and simultaneously alter organic matter production. [PDF]
Genco BM +10 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Black hole search in common interconnection networks
Networks, 2006AbstractMobile agents operating in networked environments face threats from other agents as well as from the hosts (i.e., network sites) they visit. A black hole is a harmful host that destroys incoming agents without leaving any trace. To determine the location of such a harmful host is a dangerous but crucial task, called black hole search.
DOBREV STEFAN +5 more
openaire +3 more sources
Black hole attack in mobile Ad Hoc networks
Proceedings of the 42nd annual Southeast regional conference, 2004The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header.
Mohammad Al-Shurman +2 more
openaire +1 more source
Searching for a Black Hole in Tree Networks
2005A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locating a black hole in a (partially) synchronous tree network, assuming an upper bound on the time of any edge traversal by an agent.
Czyzowicz, J. +3 more
openaire +2 more sources
Active black holes detection in ad-hoc wireless networks
2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), 2013In mobile ad hoc networks (MANET), network security problems emerge in an endless stream. For example, malicious nodes may become immediate nodes of routing paths first by replying spoof routing information. Then data packets might be stolen, modified, and even dropped by malicious nodes.
null Chun-Hsin Wang, null Yang-Tang Li
openaire +1 more source
Black Hole Traffic Anomaly Detections in Wireless Sensor Network
International Journal of Grid and High Performance Computing, 2015With the flourish of Internet of Things, the security issues in wireless sensor network (WSN), especially traffic anomaly detections, have attracted researchers' attentions. As a distributed wireless network, WSN is vulnerable to many attacks. In this research, the authors investigate the traffic anomaly detections of a well-known attack, black hole ...
Tu-Liang Lin, Hong-Yi Chang
openaire +1 more source

