Gotowa bibliografia na temat „Cooperative bait detection scheme”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cooperative bait detection scheme”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Cooperative bait detection scheme"
Olushola O, Akinlemi, and K. Suresh Babu. "Cooperative Bait Detection Scheme (CBDS) To Avoid the Collaborative Attacks of Nodes in MANET." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 66–69. https://doi.org/10.70729/j2013475.
Pełny tekst źródłaR. Saranya,, and Dr R. S. Rajesh. "Detection of Black Hole Attack in DSR Routing Protocol by modified cooperative bait detection scheme." International Journal of Research in Advent Technology 7, no. 1 (2019): 475–83. http://dx.doi.org/10.32622/ijrat.71201999.
Pełny tekst źródłaKhalaf, Osamah Ibrahim, F. Ajesh, Abdulsattar Abdullah Hamad, Gia Nhu Nguyen, and Dac-Nhuong Le. "Efficient Dual-Cooperative Bait Detection Scheme for Collaborative Attackers on Mobile Ad-Hoc Networks." IEEE Access 8 (2020): 227962–69. http://dx.doi.org/10.1109/access.2020.3045004.
Pełny tekst źródłaSULTANA, FARHEEN, and RAKSHANDA KAUKAB. "An Acknowledgement Based Advance for the Recognition of Routing Misconduct in MANETS." International Journal of Scientific Engineering and Technology Research 06, no. 06 (2017): 1178–84. https://doi.org/10.5281/zenodo.802406.
Pełny tekst źródłaM, V. Narayana, Narsimha Dr.G, and SSVN Sarma Prof. "IMPLEMENTATION OF MANET CONTROL PACKET DROP USING BAIT DETECTION APPROACH." International Journal of Engineering Sciences & Research Technology 5, no. 3 (2016): 147–55. https://doi.org/10.5281/zenodo.47008.
Pełny tekst źródłaChen, Li Na, and Chun Yu Miao. "Spectrum Detection for Cognitive Radio Based on Auto-Adaptive Threshold." Advanced Materials Research 187 (February 2011): 614–20. http://dx.doi.org/10.4028/www.scientific.net/amr.187.614.
Pełny tekst źródłaK., Sahana. "An Energy Efficient and Secure Cooperative Bait Detection and Defense Approach in MANET’s." International Journal of Computer Applications 172, no. 1 (2017): 41–45. http://dx.doi.org/10.5120/ijca2017915062.
Pełny tekst źródłaWu, Wei, Xiao Fei Zhang, and Xiao Ming Chen. "A SSDF-Attack-Exclusion Cooperative Spectrum Sensing Scheme in Cognitive Radio Networks." Applied Mechanics and Materials 556-562 (May 2014): 5219–22. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5219.
Pełny tekst źródłaJian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai. "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach." IEEE Systems Journal 9, no. 1 (2015): 65–75. http://dx.doi.org/10.1109/jsyst.2013.2296197.
Pełny tekst źródłaM, Mohan. "A Survey on Secure Cooperative Bait Detection Approach for Detecting Malicious Nodes in MANETs." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 3 (2015): 1066–69. http://dx.doi.org/10.17762/ijritcc2321-8169.150337.
Pełny tekst źródłaCzęści książek na temat "Cooperative bait detection scheme"
Sahu, Mayank, and Amit Baghel. "Modified Soft Combination Scheme for Cooperative Sequential Detection Considering Fast-Fading in Cognitive Radios." In International Conference on Intelligent Computing and Smart Communication 2019. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0633-8_126.
Pełny tekst źródłaCharan, Chhagan, and Rajoo Pandey. "Cooperative Spectrum Sensing Using Eigenvalue-Based Double-Threshold Detection Scheme for Cognitive Radio Networks." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1822-1_18.
Pełny tekst źródłaChakrabarti, Chandrima, Ananya Banerjee, Sanchari Chakrabarti, and Angana Chakraborty. "A Novel Approach for Non-cooperative Node Detection and Avoidance Using Reputation-Based Scheme in Mobile Ad hoc Network." In Computational Advancement in Communication Circuits and Systems. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2274-3_31.
Pełny tekst źródłaElazreg, Abdulghani, and Ahmad Kharaz. "Sub-Optimum Detection Scheme for Distributed Closed-Loop Quasi Orthogonal Space Time Block Coding in Asynchronous Cooperative Two Dual-Antenna Relay Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18802-7_30.
Pełny tekst źródłaYang, Kai, Shuguang Liu, Xiuguang Li, and Xu An Wang. "D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks." In Sensor Technology. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch016.
Pełny tekst źródłaBhowmick, Abhijit, Sanjay Dhar Roy, and Sumit Kundu. "Cooperative Spectrum Sensing Under Double Threshold With Censoring and Hybrid Spectrum Access Schemes in Cognitive Radio Network." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-5354-0.ch010.
Pełny tekst źródłaHan, Chong, Sami Muhaidat, Ibrahim Abualhaol, Mehrdad Dianati, and Rahim Tafazolli. "Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers." In Transportation Systems and Engineering. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8473-7.ch010.
Pełny tekst źródłaHan, Chong, Sami Muhaidat, Ibrahim Abualhaol, Mehrdad Dianati, and Rahim Tafazolli. "Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers." In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4691-9.ch008.
Pełny tekst źródłaFerrag, Mohamed Amine, and Abdelaziz Amara korba. "Achieving Secure and Privacy-Preserving in Mobile Social Networks." In Handbook of Research on Cloud Computing and Big Data Applications in IoT. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8407-0.ch006.
Pełny tekst źródłaFerrag, Mohamed Amine, and Abdelaziz Amara korba. "Achieving Secure and Privacy-Preserving in Mobile Social Networks." In Research Anthology on Securing Mobile Technologies and Applications. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch021.
Pełny tekst źródłaStreszczenia konferencji na temat "Cooperative bait detection scheme"
Islam, Anik, and Hadis Karimipour. "A Deep Learning-Based FDI Attack Detection Scheme for Secure Data Consolidation in Cooperative UxV Operations Using Zero Touch Networking." In 2024 IEEE 10th World Forum on Internet of Things (WF-IoT). IEEE, 2024. https://doi.org/10.1109/wf-iot62078.2024.10811408.
Pełny tekst źródłaDevasthali, Anita Carolene Sandeep, and Sujata Kadam. "Cooperative bait detection scheme in MANETs." In 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI). IEEE, 2017. http://dx.doi.org/10.1109/icpcsi.2017.8391799.
Pełny tekst źródłaEmimajuliet, P., and V. Thirilogasundari. "Defending collaborative attacks in MANETs using Modified Cooperative Bait Detection Scheme." In 2016 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2016. http://dx.doi.org/10.1109/icices.2016.7518906.
Pełny tekst źródłaUmar, Mubarak, Abdulrashid Sabo, and Auwal A. Tata. "Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET." In 2018 International Conference on Networking and Network Applications (NaNA). IEEE, 2018. http://dx.doi.org/10.1109/nana.2018.8648739.
Pełny tekst źródłaSharma, Renu, and Jitender Grover. "Mitigation of byzantine attack using enhanced cooperative bait detection and prevention scheme (ECBDPS)." In 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions). IEEE, 2015. http://dx.doi.org/10.1109/icrito.2015.7359296.
Pełny tekst źródłaDumne, Pradeep R., and Arati Manjaramkar. "Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs." In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2016. http://dx.doi.org/10.1109/icrito.2016.7785004.
Pełny tekst źródłaChang, Jian-Ming, Po-Chun Tsou, Han-Chieh Chao, and Jiann-Liang Chen. "CBDS: A Cooperative Bait Detection Scheme to prevent malicious node for MANET based on hybrid defense architecture." In Electronic Systems Technology (Wireless VITAE). IEEE, 2011. http://dx.doi.org/10.1109/wirelessvitae.2011.5940839.
Pełny tekst źródłaNachammai, M., and N. Radha. "Securing data transmission in MANET using an improved Cooperative Bait Detection approach." In 2016 IEEE International Conference on Advances in Computer Applications (ICACA). IEEE, 2016. http://dx.doi.org/10.1109/icaca.2016.7887968.
Pełny tekst źródłaDeny, J., A. Sivanesh Kumar, M. Sundarajan, and V. Khanna. "Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach." In 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET). IEEE, 2017. http://dx.doi.org/10.1109/icammaet.2017.8186703.
Pełny tekst źródłaChelani, Pooja L., and Sudhir T. Bagde. "Detecting collaborative attacks by malicious nodes in MANET: An improved bait detection scheme." In 2016 International Conference on Communication and Electronics Systems (ICCES). IEEE, 2016. http://dx.doi.org/10.1109/cesys.2016.7889994.
Pełny tekst źródła