Results 181 to 190 of about 1,052 (226)

Effects of Dislocation Filtering Layers on Optical Properties of Third Telecom Window Emitting InAs/InGaAlAs Quantum Dots Grown on Silicon Substrates. [PDF]

open access: yesACS Appl Mater Interfaces
Rudno-Rudziński W   +10 more
europepmc   +1 more source

Tropical cyclones drive oxygen minimum zone shoaling and simultaneously alter organic matter production. [PDF]

open access: yesSci Adv
Genco BM   +10 more
europepmc   +1 more source

Biodialyzed Palladium catalysis enables bioorthogonal drug release to control epithelial progenitor cell differentiation

open access: yes
Contreras-Montoya R   +12 more
europepmc   +1 more source

Black hole search in common interconnection networks

Networks, 2006
AbstractMobile agents operating in networked environments face threats from other agents as well as from the hosts (i.e., network sites) they visit. A black hole is a harmful host that destroys incoming agents without leaving any trace. To determine the location of such a harmful host is a dangerous but crucial task, called black hole search.
DOBREV STEFAN   +5 more
openaire   +3 more sources

Black hole attack in mobile Ad Hoc networks

Proceedings of the 42nd annual Southeast regional conference, 2004
The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header.
Mohammad Al-Shurman   +2 more
openaire   +1 more source

Searching for a Black Hole in Tree Networks

2005
A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locating a black hole in a (partially) synchronous tree network, assuming an upper bound on the time of any edge traversal by an agent.
Czyzowicz, J.   +3 more
openaire   +2 more sources

Active black holes detection in ad-hoc wireless networks

2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), 2013
In mobile ad hoc networks (MANET), network security problems emerge in an endless stream. For example, malicious nodes may become immediate nodes of routing paths first by replying spoof routing information. Then data packets might be stolen, modified, and even dropped by malicious nodes.
null Chun-Hsin Wang, null Yang-Tang Li
openaire   +1 more source

Black Hole Traffic Anomaly Detections in Wireless Sensor Network

International Journal of Grid and High Performance Computing, 2015
With the flourish of Internet of Things, the security issues in wireless sensor network (WSN), especially traffic anomaly detections, have attracted researchers' attentions. As a distributed wireless network, WSN is vulnerable to many attacks. In this research, the authors investigate the traffic anomaly detections of a well-known attack, black hole ...
Tu-Liang Lin, Hong-Yi Chang
openaire   +1 more source

Home - About - Disclaimer - Privacy