Search Result "trust-confidence aware routing"
Random Black Hole Attack Modelling and Mitigation Using Trust- Confidence Aware OLSR in MANETs for Private Data Communications
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 10 Issue: 2 Year: 2020 Page: 112-122
Author(s): Kirti A. Adoni,Anil S. Tavildar,Krishna K. Warhade
Modeling of Random Selfish Behavior Attack Using Single-Sided Laplacian Distribution and Performance Evaluation for High Security Communications in Mobile Ad-hoc Networks
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 11 Issue: 4 Year: 2021 Page: 458-471
Author(s): Kirti A. Adoni,Anil S. Tavildar,Krishna K. Warhade
Moving Forward with Throughput Modelling and Advancing Technologies
Ebook: Dominant Algorithms to Evaluate Artificial Intelligence: From the view of Throughput Model
Volume: 1 Year: 2022
Author(s):
Doi: 10.2174/9789815049541122010012
Analysis on the Improvement of Energy Efficiency by Using Its Models inWireless Sensor Networks
Journal: Recent Advances in Electrical & Electronic Engineering
Volume: 17 Issue: 7 Year: 2024 Page: 633-643
Author(s): Impa Bennuru Huliyappa Gowda,Shanthi Pichandi Anandaraj,Madhusudhan Mandya Venkatesh
Security and Trust Model Analysis for Banking System
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 11 Issue: 1 Year: 2021 Page: 135-145
Author(s): Dinesh Kumar Saini,Hemraj Saini,Surjeet Singh
Vaccination Hesitancy and Adaptation with Particular Emphasis on Women
Ebook: COVID-19: Origin, Impact and Management (Part 2)
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815165944123010009
Nursing of Patients with Haemophilia
Ebook: Frontiers in Arthritis
Volume: 2 Year: 2017
Author(s): Maria Virginia Puliga
Doi: 10.2174/9781681083537117020008
Security Challenges For Cloud-Based Email Infrastructure
Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010012
Secured IoT Model for Sensitive Data Transmission Using Blockchain Technique
Ebook: Advances in Computing Communications and Informatics
Volume: 1 Year: 2021
Author(s): Arepalli Peda Gopi,R.S.M. Lakshmi Patibandla,Vejendla Lakshman Narayana
Doi: 10.2174/9781681088624121010010
A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security
Journal: Recent Patents on Computer Science
Volume: 2 Issue: 3 Year: 2009 Page: 195-213
Author(s): Michele Amoretti