Keywords: گره مخرب; Delay tolerant networks; Flood attack; Fake packet attack; Malicious node; Misbehaving node; Packet drop attack;
مقالات ISI گره مخرب (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: گره مخرب; Wireless network; Opportunistic routing; Malicious node; Modeling; Markov;
Keywords: گره مخرب; Wireless mesh network; Opportunistic routing; Malicious node; Modeling; Markov;
Keywords: گره مخرب; Malicious node; Game theory; Coexistence; Bayesian games; Markov Bayes–Nash Equilibrium
Enhancing Rumor Riding protocol in P2P network with Cryptographic puzzle through challenge question method
Keywords: گره مخرب; Peer-to-Peer; Security; Challenge question; Reliable rumor riding protocol; Cryptographic puzzle; Malicious node;
Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET)
Keywords: گره مخرب; Routing protocol; Mobile ad hoc network (MANET); Vehicular ad hoc network (VANET); Black Hole Attack; Malicious node; Throughput;
A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks
Keywords: گره مخرب; Wireless sensor network; Malicious node; Sybil node; Watchdog Node;
Performance evaluation of MANET on the basis of Knowledge Base Algorithm
Keywords: گره مخرب; Link failure; Header Number; Throughput; Packet delivery ratio; Malicious node; Black hole node;
CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks
Keywords: گره مخرب; Vehicular ad hoc network; Intrusion detection; High mobility; Support vector machine (SVM); Malicious node; Training set size reduction
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET
Keywords: گره مخرب; JellyFish attack; TCP; Routing protocol; Malicious node; Wireless networks; Network security
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping
Keywords: گره مخرب; IDS; Malicious node; MANET; Packet dropping attacks
Trust prediction and trust-based source routing in mobile ad hoc networks
Keywords: گره مخرب; Ad hoc; Trust prediction; Source routing; Security requirement; Malicious node
Collaborative techniques for intrusion detection in mobile ad-hoc networks
Keywords: گره مخرب; MANET; Intrusion detection system (IDS); Malicious node; Security; Wireless network