Cybersecurity in politics
T Marwala - Artificial intelligence, game theory and mechanism …, 2023 - Springer
This chapter delves into the delicate confluence between cybersecurity and politics, a topic
of rising importance in the digital age. Cybersecurity is no more a standalone concern; it has …
of rising importance in the digital age. Cybersecurity is no more a standalone concern; it has …
A low-complexity, energy-efficient data securing model for wireless sensor network based on linearly complex voice encryption mechanism of GSM technology
A wireless sensor network is the formation of a temporary network of sensor nodes equipped
with limited resources working in an ad hoc environment. Routing protocol is one of the key …
with limited resources working in an ad hoc environment. Routing protocol is one of the key …
[PDF][PDF] A Signed-Response Based Node Authentication and Data Securing Scheme for Wireless Sensor Networks
MS Khan - 2019 - dev.cust.edu.pk
During the last decade, authentication of sensor node and secure routing of data been
remained an open challenges in Wireless Networks due to their applications in various …
remained an open challenges in Wireless Networks due to their applications in various …
Energy efficient secure data Transmission in wireless sensor network
Wireless sensor network (WSN) turns out to be a vital innovation identified with systems as
well as it is by and large broadly connected and received in the present day control and …
well as it is by and large broadly connected and received in the present day control and …
[引用][C] Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks
[引用][C] Performance Analysis of Mobile agents based routing Protocol in Wireless Ad hoc Network
M Patel, D Sharma