نتایج جستجو برای: misbehavior
تعداد نتایج: 965 فیلتر نتایج به سال:
Mobile Adhoc networks are prone to number of security threats due to unavailability of centralized authority. It incorporates various malicious activities within the network. This research focuses on single Blackhole attack but our design principles may be applicable to wide range of attacks. So, this proposed approach of Blackhole comprises of active routing misbehavior and forwarding misbehav...
Distributed reputation systems are a self-organizing means of supporting trusting decisions. In general, the robustness of distributed reputation systems to misbehavior is evaluated by the means of computer based simulation. However, the fundamental issue arises of how to anticipate kinds of successful misbehavior. Existing work in this field approaches this issue in an ad-hoc manner. Therefore...
We were inspired by the role of co-stimulation in the Biological immune system (BIS). We propose and evaluate an algorithm for energy efficient misbehavior detection in ad hoc wireless networks. Besides co-stimulation, this algorithm also takes inspiration from the capability of the two vital parts of the BIS, the innate and the adaptive immune system, to react in a coordinated way in the prese...
Data trustworthiness is a crucial issue in real-world participatory sensing applications. Without considering this issue, different types of worker misbehavior, especially the challenging collusion attacks, can result in biased and inaccurate estimation and decision making. We propose a novel trust-based mixture of Gaussian processes (GP) model for spatial regression to jointly detect such misb...
This study examined how classroom management practices—care and behavioral control—were differentially associated with students’ engagement, misbehavior, and satisfaction with school, using a large representative sample of 3196 Grade 9 students from 117 classes in Singapore. Results of hierarchical linear modeling showed differential relations. After controlling for students’ gender and socioec...
This paper presents a work in progress which deals with the important and unresolved problem of node misbehavior. A realistic approach is used to determine the impact of contention window manipulation on IEEE 802.11e ad-hoc networks. It is explained why such networks are more prone to misbehavior. Novel results pertaining to the 802.11e standard are presented. Simulation analysis is done for se...
Data trustworthiness is a crucial issue in real-world participatory sensing applications. Without considering this issue, different types of worker misbehavior, especially the challenging collusion attacks, can result in biased and inaccurate estimation and decision making. In this paper, we propose a novel trust-based mixture of Gaussian processes (GP) model for spatial regression to jointly d...
We consider the problem of selfish misbehavior in the optimal cross-layered rate control mechanism of wireless networks. Rate control algorithms of wireless networks are designed under the assumption that network hosts will follow the algorithm specifications. In this paper, we explain a scenario in which a selfish user achieves extra throughput by misleading the scheduling component of the net...
Emergent Geometric Organization and Informative Dimensions in Coevolutionary Algorithms A dissertation presented to the Faculty of the Graduate School of Arts and Sciences of Brandeis University, Waltham, Massachusetts by Anthony Bucci Coevolutionary algorithms vary entities which can play two or more distinct, interacting roles, with the hope of producing raw material from which a highlycapabl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید