[PDF][PDF] International Journal of Computer Engineering & Technology (ijcet)

S Kumaraswamy, SH Manjula, KR Venugopal… - Journal Impact …, 2013 - researchgate.net
Cryptographic approaches are traditional and preferred methodologies used to preserve the
privacy of data released for analysis. Privacy Preserving Data Mining (PPDM) is a new trend …

Implementação e análise de protocolos de roteamento para redes mesh sem fio LoRa

DF Medeiros - 2021 - repositorio.ufpb.br
Em um mundo cada vez mais conectado, torna-se evidente o crescimento do número de
dispositivos que trocam dados entre si autonomamente. O aumento da conectividade …

Systematic literature review: correlated fuzzy logic rules for node behavior detection in wireless sensor network

N Shahidah, AH Azni, NHM Alwi… - Journal of …, 2017 - jtec.utem.edu.my
In distributed wireless sensor network, the possibility for one or several nodes to become
faulty is directly proportional upon the number of nodes within the network. Unnecessary …

[PDF][PDF] Performance Analysis of Techniques to Improve Data Accessibility in MANETs

SS Gayathry, SP Sankar - IJERTV4IS020714, 2015 - academia.edu
Wireless networks can be infrastructure based or infrastructureless. An infrastructureless
network having large number of mobile nodes, which can fulfill a wireless interconnection …

[PDF][PDF] Avoiding Selfishness by Effective Routing Using Trust Based Mechanism

DA Das, TK Parani - academia.edu
Communication in wireless sensor networks is through nodes. High quality network needs
efficient communication between nodes. Here Order-Optimal Neighbour Discovery Using …

[引用][C] Handling Selfishness in MANETs–A Survey

SS Gayathry, RN Gaur - International Journal of Advanced Research in …, 2014

[引用][C] Improving the performance of Dynamic Source Routing for Mobile Ad-hoc Networks in the Presence of Selfish Nodes

D Lomi - 2019 - ASTU

[引用][C] A Novel Replica Allocation Approach Depth-First Iterative-Deepening for Handling Selfishness in MANETs

DFX Christopher, C Amirtham

[引用][C] Detection of DoS Attack by Selfish node in MANET using Mobile Agents

SS Shinde, BD Phulpagar, P MCOE