Cybersecurity in politics

T Marwala - Artificial intelligence, game theory and mechanism …, 2023 - Springer
This chapter delves into the delicate confluence between cybersecurity and politics, a topic
of rising importance in the digital age. Cybersecurity is no more a standalone concern; it has …

A low-complexity, energy-efficient data securing model for wireless sensor network based on linearly complex voice encryption mechanism of GSM technology

MS Khan, NM Khan, A Khan, F Aadil… - International …, 2021 - journals.sagepub.com
A wireless sensor network is the formation of a temporary network of sensor nodes equipped
with limited resources working in an ad hoc environment. Routing protocol is one of the key …

[PDF][PDF] A Signed-Response Based Node Authentication and Data Securing Scheme for Wireless Sensor Networks

MS Khan - 2019 - dev.cust.edu.pk
During the last decade, authentication of sensor node and secure routing of data been
remained an open challenges in Wireless Networks due to their applications in various …

Energy efficient secure data Transmission in wireless sensor network

VM Kuthadi, R Selvaraj, T Marwala - … Conference on SCI 2016, Volume 1, 2018 - Springer
Wireless sensor network (WSN) turns out to be a vital innovation identified with systems as
well as it is by and large broadly connected and received in the present day control and …

[引用][C] Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

[引用][C] Performance Analysis of Mobile agents based routing Protocol in Wireless Ad hoc Network

M Patel, D Sharma