Results 71 to 80 of about 4,734 (200)
Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network
In wireless communication, wormhole attack is a crucial threat that deteriorates the normal functionality of the network. Invasion of wormholes destroys the network topology completely.
Saswati Mukherjee +3 more
doaj +1 more source
On the Interplay Between Fracture Sealing and Opening in a Flow‐Stress‐Dissolution System
Abstract Reactive flow through geological fractures under stress is fundamental to subsurface hydrology. In this flow‐stress‐dissolution system, free‐surface dissolution within voids increases permeability, whereas pressure dissolution at contacting asperities combined with mechanical deformation seals the fracture.
Kai Li +3 more
wiley +1 more source
Denial of service attacks and challenges in broadband wireless networks [PDF]
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN).
Khan, MA, Khan, S, Loo, KK, Naeem, T
core +1 more source
Abstract In this study, the properties, equilibrium, and stability of compact objects within the framework of teleparallel gravity with the generalized MIT bag model are investigated. By incorporating the modified field equations, the influence of the generalized bag constant on the structure and physical characteristics of quark stars and neutron ...
Sayantan Ghosh +2 more
wiley +1 more source
MDS-Based Wormhole Detection Using Local Topology in Wireless Sensor Networks
Wormhole attack is a severe threat to wireless sensor networks (WSNs), which has received considerable attentions in the literature. However, most of the previous approaches either require special hardware devices or depend on rigorous assumptions on the
Xiaopei Lu, Dezun Dong, Xiangke Liao
doaj +1 more source
The impact of cryptocurrency heists on Bitcoin's market efficiency
Abstract Within the adaptive market hypothesis (AMH) framework, this study explores the dynamic impact of cryptocurrency heists on Bitcoin's market efficiency. By analysing Bitcoin's one‐minute price data, we calculate permutation entropy to assess market disorder and employ the complexity‐entropy causality plane to quantify structural changes in the ...
Mingnan Li, Viktor Manahov, John Ashton
wiley +1 more source
Wormhole Attack in Wireless Ad-Hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. To establish a wormhole attack, attackers create a direct link, referred to as a wormhole tunnel, between them. Wormhole tunnels can be occurring by means of a wired link, a high quality wireless out-of-band link or a logical link via packet encapsulation. After building a wormhole tunnel,
Yahya Ghanbarzadeh +2 more
openaire +1 more source
Security is a crucial factor for information systems and other vital infrastructures. Ensuring robust security measures is imperative due to the substantial volume of network traffic. On the other side, many network components are susceptible to cyber threats and attacks owing to their inherent properties.
Fatima Al‐Quayed +5 more
wiley +1 more source
A two‐step authentication framework for Mobile ad hoc networks [PDF]
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C. +2 more
core
ABSTRACT Introduction Nutrition education materials are frequently used by dietitians to support counselling and education. Few studies have explored consumer perspectives regarding these resources and none in a contemporary setting post pandemic. Methods Purposive sampling was used to recruit a range of Australian consumers to participate in seven ...
Kelly Lambert +5 more
wiley +1 more source

