Results 101 to 110 of about 4,734 (200)

Analysis of Wormhole Attack Confirmation System During Email Dumping Attack

open access: yesComputer Science & Information Technology (CS & IT), 2017
Divya Sai Keerthi T, Pallapa Venkataram
openaire   +1 more source

A systematic review of routing attacks detection in wireless sensor networks. [PDF]

open access: yesPeerJ Comput Sci, 2022
Alansari Z   +3 more
europepmc   +1 more source

Analyzing the Impact of Active Attack on the Performance of the AMCTD Protocol in Underwater Wireless Sensor Networks. [PDF]

open access: yesSensors (Basel), 2023
Saeed K   +6 more
europepmc   +1 more source

A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare. [PDF]

open access: yesSci Rep, 2023
Hosseinzadeh M   +8 more
europepmc   +1 more source

Wormhole Attack in Wireless Sensor Network

open access: yesInternational Journal of Computer Networks and Communications Security, 2014
openaire   +1 more source

Home - About - Disclaimer - Privacy