Discover more insights into Malicious Nodes 악성 노드

Keywords frequently search together with Malicious Nodes 악성 노드

Narrow sentence examples with built-in keyword filters

Malicious Nodes sentence examples within black hole attack



A Data Driven Trust Mechanism Based on Blockchain in IoT Sensor Networks for Detection and Mitigation of Attacks


A new efficient approach for detecting single and multiple black hole attacks

Malicious Nodes sentence examples within selective forwarding attack



Impact of DoS attack in IoT system and identifying the attacker location for interference attacks


An Active-Routing Authentication Scheme in MANET

Malicious Nodes sentence examples within packet delivery ratio



Secure Multi-objective hybrid routing protocol for wireless sensor network


Adaptive DSR to mitigate packet dropping attacks in WMNs using cross layer metrics



Malicious Nodes sentence examples within Detect Malicious Nodes



Malicious Node Detection in Smart Grid Networks


A trust infrastructure based authentication method for clustered vehicular ad hoc networks

Malicious Nodes sentence examples within Detecting Malicious Nodes



Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol


A Comparative Analysis of Semi-Supervised Learning in Detecting Burst Header Packet Flooding Attack in Optical Burst Switching Network

Malicious Nodes sentence examples within Identify Malicious Nodes



An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN)


Fog Layer-based DDoS attack Detection Approach for Internet-of-Things (IoTs) devices

Malicious Nodes sentence examples within Isolate Malicious Nodes



Energy Proficient Hybrid Secure Scheme for Wireless Sensor Networks


Mitigating Routing Attacks in Mobile Ad Hoc Networks

Malicious Nodes sentence examples within Eliminate Malicious Nodes



Monitory Consensus Mechanism of Blockchain for Internet of Things


Implementation of ACO in Vanet with Detection of Faulty Node

Malicious Nodes sentence examples within Identifying Malicious Nodes



UAVouch: A Secure Identity and Location Validation Scheme for UAV-Networks


Decision-Making Model for Securing IoT Devices in Smart Industries

Malicious Nodes sentence examples within Prevent Malicious Nodes



A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks


A provably secure ECC-based access and handover authentication protocol for space information networks

Malicious Nodes sentence examples within Multiple Malicious Nodes



Multi-malicious nodes double-spending attack blacklist management model


A scalable blockchain based trust management in VANET routing protocol

Malicious Nodes sentence examples within malicious nodes present



Hidden Markov Trust for Attenuation of Selfish and Malicious Nodes in the IoT Network


EFFICIENT TRUST BASED SCHEMES FOR QUALITY OF SERVICE IN MANET

Malicious Nodes sentence examples within malicious nodes may



R2SCDT: robust and reliable secure clustering and data transmission in vehicular ad hoc network using weight evaluation


A Novel Clustering Protocol Based on Willow Butterfly Algorithm for Diffusing Data in Wireless Sensor Networks

Malicious Nodes sentence examples within malicious nodes entering



Blockchain Based Trust Model Using Tendermint in Vehicular Adhoc Networks


Blockchain Based Trust Model Using Tendermint in Vehicular Adhoc Networks

Malicious Nodes sentence examples within malicious nodes increase



Blockchain-based distributed management system for trust in VANET


Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks


Blockchain-Enabled Adaptive-Learning-Based Resource-Sharing Framework for IIoT Environment


More Malicious Nodes 악성 노드 sentence examples
10.1109/INFOCOMWKSHPS51825.2021.9484458

Trust-based Model for Securing Vehicular Networks Against RSU Attacks



Deep reinforcement learning assisted edge-terminal collaborative offloading algorithm of blockchain computing tasks for energy Internet



Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks



An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks


More Malicious Nodes 악성 노드 sentence examples
10.1016/J.COMPELECENG.2021.107123

Context-oriented trust computation model for industrial Internet of Things



A Probabilistic Data Structures-Based Anomaly Detection Scheme for Software-Defined Internet of Vehicles



Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings



Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design



A Review of consensus protocols in permissioned blockchains



Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET



Blockchain-Based Trust Edge Knowledge Inference of Multi-Robot Systems for Collaborative Tasks



Research on Consensus Mechanism in Microgrid Transaction



A novel approach for anti-pollution attacks in network coding



Defense Countermeasures for DoS Attacks in WSNs Using Deep Radial Basis Networks



A Secure Clustering Protocol With Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks



A secure multicast routing algorithm Based on distributed PCE in multi-domain optical networks



Efficient Intrusion detection of malicious node using Bayesian Hybrid Detection in MANET



Security Techniques Against Power Exhausting Attacks in WSN: A Fundamental Study



An Information and Predictive Credibility Control System Using Blockchain Technique



Subtractive Gradient Boost Clustering for Mobile Node Authentication in Internet of Things Aware 5G Networks



A Sharding Scheme-Based Many-Objective Optimization Algorithm for Enhancing Security in Blockchain-Enabled Industrial Internet of Things



AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT



Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs



An Optimized and Hybrid Energy Aware Routing Model for Effective Detection Of Flooding Attacks in a Manet Environment



An Illustrative Study of Vehicle Ad-Hoc Network Security using Advanced Encryption Standard Algorithm



Byzantine Agreement and Leader Election: From Classical to the Modern



Secure Intruder Information Sharing in Wireless Sensor Network for Attack Resilient Routing



Detection of Selfish Nodes Through Reputation Model In Mobile Adhoc Network - MANET



Hierarchical Hybrid Trust Management Scheme in SDN-Enabled VANETs



A Proof-of-Quality-Factor (PoQF)-Based Blockchain and Edge Computing for Vehicular Message Dissemination



Research on the scheme of radio cooperative spectrum sensing for offshore ships based on trust degree in Ad Hoc network mode



Resilient Consensus for Robust Multiplex Networks with Asymmetric Confidence Intervals



Construction of Internet of things trusted group based on multidimensional attribute trust model



Robustness and efficiency of voting consensus protocols within byzantine infrastructures



Trusted measurement of behaviors for the Internet of Things



Adaptive and Robust Routing With Lyapunov-Based Deep RL in MEC Networks Enabled by Blockchains


More Malicious Nodes 악성 노드 sentence examples
10.1016/j.automatica.2021.109775

Secure Consensus with Distributed Detection via Two-hop Communication



Trust aware similarity-based source routing to ensure effective communication using game-theoretic approach in VANETs


Learn more from Malicious Nodes 악성 노드

Malicious Nodes 악성 노드


Malicious Nodes 악성 노드
Encyclopedia 백과사전