Results 71 to 80 of about 4,734 (200)

Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network

open access: yesJournal of Computer Networks and Communications, 2016
In wireless communication, wormhole attack is a crucial threat that deteriorates the normal functionality of the network. Invasion of wormholes destroys the network topology completely.
Saswati Mukherjee   +3 more
doaj   +1 more source

On the Interplay Between Fracture Sealing and Opening in a Flow‐Stress‐Dissolution System

open access: yesWater Resources Research, Volume 61, Issue 10, October 2025.
Abstract Reactive flow through geological fractures under stress is fundamental to subsurface hydrology. In this flow‐stress‐dissolution system, free‐surface dissolution within voids increases permeability, whereas pressure dissolution at contacting asperities combined with mechanical deformation seals the fracture.
Kai Li   +3 more
wiley   +1 more source

Denial of service attacks and challenges in broadband wireless networks [PDF]

open access: yes, 2008
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN).
Khan, MA, Khan, S, Loo, KK, Naeem, T
core   +1 more source

Maximum Mass Limit of Generalized MIT Compact Star: A Theoretical Study of Thin Shell Dynamics and Gravitational Lensing

open access: yesFortschritte der Physik, Volume 73, Issue 8, August 2025.
Abstract In this study, the properties, equilibrium, and stability of compact objects within the framework of teleparallel gravity with the generalized MIT bag model are investigated. By incorporating the modified field equations, the influence of the generalized bag constant on the structure and physical characteristics of quark stars and neutron ...
Sayantan Ghosh   +2 more
wiley   +1 more source

MDS-Based Wormhole Detection Using Local Topology in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2012
Wormhole attack is a severe threat to wireless sensor networks (WSNs), which has received considerable attentions in the literature. However, most of the previous approaches either require special hardware devices or depend on rigorous assumptions on the
Xiaopei Lu, Dezun Dong, Xiangke Liao
doaj   +1 more source

The impact of cryptocurrency heists on Bitcoin's market efficiency

open access: yesInternational Journal of Finance &Economics, Volume 30, Issue 3, Page 2912-2929, July 2025.
Abstract Within the adaptive market hypothesis (AMH) framework, this study explores the dynamic impact of cryptocurrency heists on Bitcoin's market efficiency. By analysing Bitcoin's one‐minute price data, we calculate permutation entropy to assess market disorder and employ the complexity‐entropy causality plane to quantify structural changes in the ...
Mingnan Li, Viktor Manahov, John Ashton
wiley   +1 more source

Wormhole Attack in Wireless Ad-Hoc Networks

open access: yesInternational Journal of Computer Theory and Engineering, 2012
Wormhole attack is a severe attack in wireless ad-hoc networks. To establish a wormhole attack, attackers create a direct link, referred to as a wormhole tunnel, between them. Wormhole tunnels can be occurring by means of a wired link, a high quality wireless out-of-band link or a logical link via packet encapsulation. After building a wormhole tunnel,
Yahya Ghanbarzadeh   +2 more
openaire   +1 more source

Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain‐Based Intrusion Detection System for Smart Cities

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 36, Issue 4, April 2025.
Security is a crucial factor for information systems and other vital infrastructures. Ensuring robust security measures is imperative due to the substantial volume of network traffic. On the other side, many network components are susceptible to cyber threats and attacks owing to their inherent properties.
Fatima Al‐Quayed   +5 more
wiley   +1 more source

A two‐step authentication framework for Mobile ad hoc networks [PDF]

open access: yes, 2007
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C.   +2 more
core  

Designing Better Resources: Consumer Experiences, Priorities and Preferences Regarding Contemporary Nutrition Education Materials

open access: yesJournal of Human Nutrition and Dietetics, Volume 38, Issue 2, April 2025.
ABSTRACT Introduction Nutrition education materials are frequently used by dietitians to support counselling and education. Few studies have explored consumer perspectives regarding these resources and none in a contemporary setting post pandemic. Methods Purposive sampling was used to recruit a range of Australian consumers to participate in seven ...
Kelly Lambert   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy