Search Result "trust-confidence aware routing"


Research Article

Random Black Hole Attack Modelling and Mitigation Using Trust- Confidence Aware OLSR in MANETs for Private Data Communications

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 10 Issue: 2 Year: 2020 Page: 112-122
Author(s): Kirti A. Adoni,Anil S. Tavildar,Krishna K. Warhade

Research Article

Modeling of Random Selfish Behavior Attack Using Single-Sided Laplacian Distribution and Performance Evaluation for High Security Communications in Mobile Ad-hoc Networks

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 11 Issue: 4 Year: 2021 Page: 458-471
Author(s): Kirti A. Adoni,Anil S. Tavildar,Krishna K. Warhade

Moving Forward with Throughput Modelling and Advancing Technologies

Ebook: Dominant Algorithms to Evaluate Artificial Intelligence: From the view of Throughput Model
Volume: 1 Year: 2022
Author(s):
Doi: 10.2174/9789815049541122010012

Systematic Review Article

Analysis on the Improvement of Energy Efficiency by Using Its Models inWireless Sensor Networks

Journal: Recent Advances in Electrical & Electronic Engineering
Volume: 17 Issue: 7 Year: 2024 Page: 633-643
Author(s): Impa Bennuru Huliyappa Gowda,Shanthi Pichandi Anandaraj,Madhusudhan Mandya Venkatesh

General Research Article

Security and Trust Model Analysis for Banking System

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 11 Issue: 1 Year: 2021 Page: 135-145
Author(s): Dinesh Kumar Saini,Hemraj Saini,Surjeet Singh

Vaccination Hesitancy and Adaptation with Particular Emphasis on Women

Ebook: COVID-19: Origin, Impact and Management (Part 2)
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815165944123010009

Nursing of Patients with Haemophilia

Ebook: Frontiers in Arthritis
Volume: 2 Year: 2017
Author(s): Maria Virginia Puliga
Doi: 10.2174/9781681083537117020008

Security Challenges For Cloud-Based Email Infrastructure

Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010012

Secured IoT Model for Sensitive Data Transmission Using Blockchain Technique

Ebook: Advances in Computing Communications and Informatics
Volume: 1 Year: 2021
Author(s): Arepalli Peda Gopi,R.S.M. Lakshmi Patibandla,Vejendla Lakshman Narayana
Doi: 10.2174/9781681088624121010010

A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security

Journal: Recent Patents on Computer Science
Volume: 2 Issue: 3 Year: 2009 Page: 195-213
Author(s): Michele Amoretti

Previous   Next

Go To   Results 1 - 1 of 38

Apply Filters

Volume Years
Article Type
Publication Title
Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy