Results 51 to 60 of about 4,734 (200)

Wormhole attack detection techniques in ad-hoc network: A systematic review

open access: yesOpen Computer Science, 2022
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different
Gupta Chitvan   +2 more
doaj   +1 more source

Two Tunnels to Inflation

open access: yes, 2006
We investigate the formation via tunneling of inflating (false-vacuum) bubbles in a true-vacuum background, and the reverse process. Using effective potentials from the junction condition formalism, all true- and false-vacuum bubble solutions with ...
A. D. Linde   +2 more
core   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Impact of Blackhole and Wormhole Attacks on DSDV Routing Protocol in VANET: Behavioural Analysis

open access: yesJournal of Computing Research and Innovation
Vehicular Ad-Hoc Networks (VANETs) play a crucial role in Intelligent Transportation Systems (ITS) and the advancement of intelligent vehicles, enabling seamless and reliable communication between vehicles and infrastructure. This communication supports
Ahmad Yusri Dak   +2 more
doaj   +1 more source

A review on wormhole attacks in MANET [PDF]

open access: yes, 2015
Mobile Ad-hoc Network (MANET) refers to a multi-hop packet based wireless network consist of number of mobile nodes which be able to communicate and move simultaneously, without using any fixed infrastructure.
Enshaei, Mehdi, Mohd Hanapi, Zurina
core  

A Review on Understanding and Strengthening of Active Species in Titanium Silicalite‐1 (TS‐1) Catalysts

open access: yesAdvanced Science, Volume 12, Issue 47, December 18, 2025.
The hydrolysis rate matching strategy, crystallization rate matching strategy of the titanium and silicon sources, dissolution‐recrystallization strategy in the synthesis process can be designed to regulate the microenvironment of active centers to design TS‐1 enriched in Ti active species.
Yan Xue   +9 more
wiley   +1 more source

Secure Neighbor Discovery in Wireless Sensor Networks Using Range-Free Localization Techniques

open access: yesInternational Journal of Distributed Sensor Networks, 2012
If a wireless sensor network (WSN) is deployed in a hostile environment, the intrinsic limitations of the nodes lead to many security issues. In this paper, we address a particular attack to the location and neighbor discovery protocols, carried out by ...
Mariano García-Otero   +1 more
doaj   +1 more source

Isolating Wormhole Attack in Wireless Sensor Networks

open access: yesCircuits and Systems, 2016
Short Retraction Notice Circuits and Systems (CS) does not meet author’s publication requirements. This article has been retracted to straighten the academic record. In making this decision the Editorial Board follows COPE's Retraction Guidelines.
L. Thanga Mariappan, K. Rubasoundar
openaire   +2 more sources

Effects of Evolving Precipitation on Chemical Transport Through Porous Media

open access: yesWater Resources Research, Volume 61, Issue 11, November 2025.
Abstract Flow through porous media together with precipitation and/or dissolution reactions involves a unique feedback behavior as these medium‐altering reactions affect the flow field and vice versa. Herein, the relationship between a gradually increasing degree of precipitation and the degree of anomalous transport (i.e., divergence from Fickian ...
Matan Cohen, Ishai Dror, Brian Berkowitz
wiley   +1 more source

ResNeXt and Deep Stacked Autoencoder based framework for wormhole attack detection on network control system

open access: yesDiscover Computing
Network Control Systems (NCS), including Wireless Sensor Networks (WSN) are broadly deployed across different application areas. A prominent dispute in WSNs is the liability to wormhole attacks, which lead to routing errors, degradation of sensor network
Avina A, Geetha M. R
doaj   +1 more source

Home - About - Disclaimer - Privacy