[PDF][PDF] International Journal of Computer Engineering & Technology (ijcet)
S Kumaraswamy, SH Manjula, KR Venugopal… - Journal Impact …, 2013 - researchgate.net
Cryptographic approaches are traditional and preferred methodologies used to preserve the
privacy of data released for analysis. Privacy Preserving Data Mining (PPDM) is a new trend …
privacy of data released for analysis. Privacy Preserving Data Mining (PPDM) is a new trend …
Implementação e análise de protocolos de roteamento para redes mesh sem fio LoRa
DF Medeiros - 2021 - repositorio.ufpb.br
Em um mundo cada vez mais conectado, torna-se evidente o crescimento do número de
dispositivos que trocam dados entre si autonomamente. O aumento da conectividade …
dispositivos que trocam dados entre si autonomamente. O aumento da conectividade …
Systematic literature review: correlated fuzzy logic rules for node behavior detection in wireless sensor network
In distributed wireless sensor network, the possibility for one or several nodes to become
faulty is directly proportional upon the number of nodes within the network. Unnecessary …
faulty is directly proportional upon the number of nodes within the network. Unnecessary …
[PDF][PDF] Performance Analysis of Techniques to Improve Data Accessibility in MANETs
SS Gayathry, SP Sankar - IJERTV4IS020714, 2015 - academia.edu
Wireless networks can be infrastructure based or infrastructureless. An infrastructureless
network having large number of mobile nodes, which can fulfill a wireless interconnection …
network having large number of mobile nodes, which can fulfill a wireless interconnection …
[PDF][PDF] Avoiding Selfishness by Effective Routing Using Trust Based Mechanism
DA Das, TK Parani - academia.edu
Communication in wireless sensor networks is through nodes. High quality network needs
efficient communication between nodes. Here Order-Optimal Neighbour Discovery Using …
efficient communication between nodes. Here Order-Optimal Neighbour Discovery Using …
[引用][C] Improving the performance of Dynamic Source Routing for Mobile Ad-hoc Networks in the Presence of Selfish Nodes
D Lomi - 2019 - ASTU
[引用][C] A Novel Replica Allocation Approach Depth-First Iterative-Deepening for Handling Selfishness in MANETs
DFX Christopher, C Amirtham
[引用][C] Detection of DoS Attack by Selfish node in MANET using Mobile Agents
SS Shinde, BD Phulpagar, P MCOE