Results 1 to 10 of about 1,052,363 (331)
Detecting and Quantifying Networks of Biological Kinship via Exponential Family Random Graph Models
Rohrlach AB +5 more
europepmc +1 more source
On the impacts of join and leave on the propagation ratio of topology-aware active worms
Today, the propagation of active worms in peer-to-peer (P2P) networks is a very serious issue. Therefore, studying the propagation behavior of active worms and modeling their proliferation is quite useful to employ an effective and low-cost defense strategy to reduce the rate of their propagation. The topology-aware worms use the information related to
Ahmad Jafarabadi +1 more
semanticscholar +4 more sources
The scanning method of computer worms is an important modeling parameter. Active worms use different methods to scan the network for selecting their victim hosts. Topology-aware active worms scan the network by using the information of the network topology.
Ahmad Jafarabadi +1 more
semanticscholar +4 more sources
Some of the next articles are maybe not open access.
Algebra Universalis, 2020
A join-semilattice L with top is said to be conjunctive if every principal ideal is an intersection of maximal ideals. (This is equivalent to a first-order condition in the language of semilattices.) In this paper, we explore the consequences of the ...
Charles N. Delzell, O. Ighedo, J. Madden
semanticscholar +1 more source
A join-semilattice L with top is said to be conjunctive if every principal ideal is an intersection of maximal ideals. (This is equivalent to a first-order condition in the language of semilattices.) In this paper, we explore the consequences of the ...
Charles N. Delzell, O. Ighedo, J. Madden
semanticscholar +1 more source
You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques
Conference on Computer and Communications Security, 2019Cryptocurrencies are digital assets which depend upon the use of distributed peer-to-peer networks. The method a new peer uses to initially join a peer-to-peer network is known as bootstrapping.
Angelique Faye Loe, Elizabeth A. Quaglia
semanticscholar +1 more source
IEEE Communications Surveys and Tutorials, 2020
The IETF IPv6 over the TSCH mode of IEEE802.15.4e (6TiSCH) working group has standardized a set of protocols to enable low power industrial-grade IPv6 networks.
Xavier Vilajosana +5 more
semanticscholar +1 more source
The IETF IPv6 over the TSCH mode of IEEE802.15.4e (6TiSCH) working group has standardized a set of protocols to enable low power industrial-grade IPv6 networks.
Xavier Vilajosana +5 more
semanticscholar +1 more source
Monitoring the Impact of the Nodes Density on the MANETs’ Environment
2022 5th International Conference on Engineering Technology and its Applications (IICETA), 2022MANETs (Mobile Ad-hoc Networks) are self-contained systems that can function without the use of centralized controllers, pre-configured paths/routes, or advanced communication structures.
Ali Hassan Alwan +8 more
semanticscholar +1 more source
ACM/IEEE International Conference on Mobile Computing and Networking, 2001
Benjie Chen +3 more
semanticscholar +1 more source
Benjie Chen +3 more
semanticscholar +1 more source

