×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [selfish node]
Secure routing in Wireless sensor Networks: Attacks and Countermeasures AUTHORS: CHRIS KARLOF AND DAVID WAGNER UNIVERSITY OF CALIFORNIA AT BERKELEY, BERKELEY,
215 views
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar
216 views
The detection of routing misbehavior in mobile ad hoc networks
339 views
The detection of routing misbehavior in mobile ad hoc networks
601 views
Detection of-malicious-nodes-in-mobile-adhoc-network-vijendra-pratap-singh-sanjay-sachan1
81 views
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University
212 views
Overlay Network Creation and Maintenance with Selfish Users Georgios Smaragdakis Dissertation committee members: Azer Bestavros, Nikolaos Laoutaris, John
218 views
Routing Security in Ad Hoc Networks Justin Lomheim Shirshanka Das
219 views
Ch 6. Security in WMNs Myungchul Kim
[email protected]
216 views
Routing Security in Ad Hoc Networks
51 views
1 Distributed Selfish Replication Nikolaos Laoutaris Orestis Telelis Vassilios Zissimopoulos Ioannis Stavrakakis {laoutaris,telelis,vassilis,ioannis}@di.uoa.gr
221 views