نتایج جستجو برای: misbehavior

تعداد نتایج: 965  

Journal: :CoRR 2018
Yuanyu Zhang Shoji Kasahara Yulong Shen Xiaohong Jiang Jianxiong Wan

This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-obj...

2017
Zahra Soltani Mohammadi Kiarash Mizanian Mehdi Agha Sarram Salman Goli

VANETs are a subset of Mobile Ad-hoc Networks (MANETs) in which communication nodes are mainly vehicles. Communication in Vehicular ad hoc Network relies on cooperation between vehicles but, a node may behave malicious or selfish in order to get advantage over other vehicles. A misbehaving node may transmit false alerts, tamper messages, create congestion in the network, drop, delay and duplica...

Journal: :CoRR 2015
Sonal Shrivastava Chetan Agrawal Anurag Jain

In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver data in between source and destination. In this research we work on security field in MANET ...

2004
Jean-Yves Le Boudec

The successful operation of a mobile ad hoc network depends on cooperation of the nodes in providing services to each other. Nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR) [13]. The network is vulnerable due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability [1], [...

Journal: :Journal of Advanced Transportation 2022

Vehicular ad hoc networks (VANETs) can increase road safety and comfort. It needs strong demand for security because the data sent in VANETs influence vehicles’ behavior. Existing studies have summarized VANET security, challenge, attacks. This study aims to present a comprehensive overview of misbehavior detection VANETs. First, characteristics, issues, attacks are discussed. Then, precise def...

2015
Ilya Nikolaevskiy Andrey Lukyanenko Andrei Gurtov

Nash Bargaining Solution (NBS) has been broadly suggested as an efficient solution for problem of fair allocation of multiple resources, namely bandwidth allocation in datacenters. In spite of being thoroughly studied, and provably strategyproof for most scenarios, NBS-based allocation methods lack research on strategic behavior of tenants in case of proportionality of resource demands, which i...

2016
Joeri K. Tijdink Lex M. Bouter Coosje L. S. Veldkamp Peter M. van de Ven Jelte M. Wicherts Yvo M. Smulders

BACKGROUND Personality influences decision making and ethical considerations. Its influence on the occurrence of research misbehavior has never been studied. This study aims to determine the association between personality traits and self-reported questionable research practices and research misconduct. We hypothesized that narcissistic, Machiavellianistic and psychopathic traits as well as sel...

Journal: :Journal of occupational health psychology 2011
Aleksandra Luksyte Christiane Spitzmueller Douglas C Maynard

In the modern marketplace, especially when unemployment is high, more and more Americans find themselves overqualified (i.e., possessing more competencies than the job requires). Using and extending person-environment fit theory and the stressor-emotion model of counterproductive work behaviors (CWBs), we examine whether overqualified employees are more likely to display CWBs than employees who...

2015
J. Antony Daniel Rex P. Anjala Mary

Delay tolerant networks (DTNs) exploit the intermittent connectivity between mobile nodes to transfer data. Due to a lack of consistent connectivity, two nodes exchange data only when they move into the transmission range of nodes In DTNs, a node may misbehave by dropping packets even when it has sufficient buffers. Routing misbehavior can be caused by selfish nodes that are unwilling to spend ...

Journal: :Archives of pediatrics & adolescent medicine 1999
R R Socolar J Winsor W M Hunter D Catellier J B Kotch

OBJECTIVES To describe maternal discipline of children in at-risk families and to determine factors associated with disciplinary practices. DESIGN Cross-sectional survey. SETTING At-risk families in North Carolina followed up in a longitudinal study of child maltreatment. PARTICIPANTS Maternal caregivers of 7- to 9-year-old children with factors at birth that placed them at risk. MEASUR...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید