Results 131 to 140 of about 60,380 (140)

Implementation of a novel secured authentication protocol for cyber security applications. [PDF]

open access: yesSci Rep
Suresh Kumar V   +7 more
europepmc   +1 more source

Security at the Edge for Resource-Limited IoT Devices. [PDF]

open access: yesSensors (Basel)
Canavese D   +3 more
europepmc   +1 more source

Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks

open access: closed, 2006
Aikaterini Mitrokotsa   +2 more
openalex  

Preventing Dropping Packets Attack in Sensor Networks: A Game Theory Approach

open access: closed, 2008
Yang   +5 more
openalex  

Home - About - Disclaimer - Privacy