نتایج جستجو برای: routing misbehavior

تعداد نتایج: 54648  

Journal: :Proceedings of the IEEE 2014

Journal: :Journal of Association of Arab Universities for Tourism and Hospitality 2021

2009
M. Gunasekaran P. Sampath B. Gopalakrishnan

Security is a critical problem when implementing Mobile Ad Hoc Networks (MANETs) and is widely acknowledged. This paper describes the effects of selfish nodes in MANETs. An Ad Hoc Network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. One of the different kinds of misbehavior is node selfishnes...

2012
V. Manjula C. Chellappan

The harmful attack against Wireless Sensor Networks (WSN) is Node Replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. The Node replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, This study proposes a method R...

Journal: :CBU International Conference Proceedings 2016

Journal: :SSRN Electronic Journal 2005

2006
Ilia Polian Bernd Becker Masato Nakasato Satoshi Ohtake Hideo Fujiwara

In late-age silicon, soft errors become an issue even for low-margin products. Since classical hardening techniques are associated with costs which may not be acceptable for such ICs, selective hardening which targets only a subset of all possible soft errors has been suggested. We propose a soft error selection method based on severity of an error’s impact on system behavior. Some soft errors ...

Journal: :International Journal of Educational and Psychological Researches 2016

Journal: :Proceedings of the National Academy of Sciences 2015

2003
Nam T. Nguyen Peter L. Reiher Geoffrey H. Kuenning

One approach to detecting insider misbehavior is to monitor system call activity and watch for danger signs or unusual behavior. We describe an experimental system designed to test this approach. We tested the system’s ability to detect common insider misbehavior by examining file system and process-related system calls. Our results show that this approach can detect many such activities. *

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید