Gotowa bibliografia na temat „Wormhole link”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Wormhole link”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Wormhole link"

1

Samman, Faizal A., Thomas Hollstein, and Manfred Glesner. "Networks-On-Chip Based on Dynamic Wormhole Packet Identity Mapping Management." VLSI Design 2009 (April 7, 2009): 1–15. http://dx.doi.org/10.1155/2009/941701.

Pełny tekst źródła
Streszczenie:
This paper presents a network-on-chip (NoC) with flexible infrastructure based on dynamic wormhole packet identity management. The NoCs are developed based on a VHDL approach and support the design flexibility. The on-chip router uses a wormhole packet switching method with a synchronous parallel pipeline technique. Routing algorithms and dynamic wormhole local packet identity (ID-tag) mapping management are proposed to support a wire sharing methodology and an ID slot division multiplexing technique. At each communication link, flits belonging to the same message have the same local ID-tag, a
Style APA, Harvard, Vancouver, ISO itp.
2

Safitri, Nini Kurnia, Andy Hidayat Jatmika, and Moh Ali Albar. "Deteksi dan Pencegahan Serangan Wormhole pada Protokol Routing AOMDV menggunakan Gabungan Metode Delphi dan RTT-TC pada Jaringan MANET." Journal of Computer Science and Informatics Engineering (J-Cosine) 3, no. 1 (2019): 49–55. http://dx.doi.org/10.29303/jcosine.v3i1.242.

Pełny tekst źródła
Streszczenie:
Mobile Ad Hoc Network (MANET) is a network consisting of a group of mobile nodes that don't have a fixed infrastructure. This causes the MANET to be vulnerable to attacks that can interfere with the process of communication and data transmission on the network. One type of attack that can attack the MANET is a wormhole attack. The wormhole is an attack on a network where there are two or more wormhole nodes that are interconnected and work together to attack network traffic or discard data packets it receives. Each wormhole node will be connected to each other using a wormhole link. To prevent
Style APA, Harvard, Vancouver, ISO itp.
3

K*, Parvathy. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering 10, no. 1 (2021): 199–203. http://dx.doi.org/10.35940/ijrte.a5873.0510121.

Pełny tekst źródła
Streszczenie:
In the current world people are using the sensing networks called IoT and WSN as the subset of IoT in various applications. The employment of these sensor networks is rapidly increasing. Due to the longer usage of these sensor networks security issues are eventually happening and has the possibility of developing the attacks in the network. In this review, focuses on wormhole attacks in wireless sensor network (WSN) and Internet of Things (IoT) creating a tunnels i.e., wormhole link in between source and the destination node in the network. The classification of wormhole attack in both WSN and
Style APA, Harvard, Vancouver, ISO itp.
4

Parvathy.K. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 1 (2021): 199–203. https://doi.org/10.35940/ijrte.A5873.0510121.

Pełny tekst źródła
Streszczenie:
In the current world people are using the sensing networks called IoT and WSN as the subset of IoT in various applications. The employment of these sensor networks is rapidly increasing. Due to the longer usage of these sensor networks security issues are eventually happening and has the possibility of developing the attacks in the network. In this review, focuses on wormhole attacks in wireless sensor network (WSN) and Internet of Things (IoT) creating a tunnels i.e., wormhole link in between source and the destination node in the network. The classification of wormhole attack in both WSN and
Style APA, Harvard, Vancouver, ISO itp.
5

Hanif, Maria, Humaira Ashraf, Zakia Jalil, et al. "AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks." Electronics 11, no. 15 (2022): 2324. http://dx.doi.org/10.3390/electronics11152324.

Pełny tekst źródła
Streszczenie:
The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole attack that uses a low latency link between two malicious sensor nodes and affects the routing paths of the entire network. This attack is brutal as it is resistant to many cryptographic schemes and hard to observe within the network. This paper provides a comprehensive review of the literature on the
Style APA, Harvard, Vancouver, ISO itp.
6

Guz, Zvika, Isask'har Walter, Evgeny Bolotin, Israel Cidon, Ran Ginosar, and Avinoam Kolodny. "Network Delays and Link Capacities in Application-Specific Wormhole NoCs." VLSI Design 2007 (April 23, 2007): 1–15. http://dx.doi.org/10.1155/2007/90941.

Pełny tekst źródła
Streszczenie:
Network-on-chip- (NoC-) based application-specific systems on chip, where information traffic is heterogeneous and delay requirements may largely vary, require individual capacity assignment for each link in the NoC. This is in contrast to the standard approach of on- and off-chip interconnection networks which employ uniform-capacity links. Therefore, the allocation of link capacities is an essential step in the automated design process of NoC-based systems. The algorithm should minimize the communication resource costs under Quality-of-Service timing constraints. This paper presents a novel
Style APA, Harvard, Vancouver, ISO itp.
7

Balkisu, Musa Hari, and Ahmad Aminu Ali. "Attention Based Gated Recurrent Neural Network for Wormhole Attack Detection in MANETs." International Journal of Computer Science and Information Technology Research 11, no. 4 (2023): 20–28. https://doi.org/10.5281/zenodo.8424623.

Pełny tekst źródła
Streszczenie:
<strong>Abstract:</strong> The wormhole attack is a type of attack on the network layer that affects the routing protocols. In this study, we investigate the use of Gated Recurrent Unit (GRU) with an attention mechanism and Decision Tree, for detecting wormhole attacks in mobile ad hoc networks (MANETs). This study is divided into three main tasks. Firstly, simulating wormhole attacks in a mobile ad hoc networks (MANETs) environment with a finite number of nodes Secondly, describe the network characteristics that contribute to feature selection. Consequently, we perform data generation and dat
Style APA, Harvard, Vancouver, ISO itp.
8

Ben-Itzhak, Yaniv, Israel Cidon, and Avinoam Kolodny. "Average latency and link utilization analysis of heterogeneous wormhole NoCs." Integration, the VLSI Journal 51 (September 2015): 92–106. http://dx.doi.org/10.1016/j.vlsi.2015.07.002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

International, Journal on AdHoc Networking Systems (IJANS). "A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network." International Journal on AdHoc Networking Systems (IJANS) 2, no. 4 (2024): 37–50. https://doi.org/10.5121/ijans.2012.2404.

Pełny tekst źródła
Streszczenie:
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authorityi.e. Base station are capable of exhibiting interesting applications due to their ability to be deployedubiquitously in hostile &amp; pervasive environments. But due to same reason security is becoming a majorconcern for these networks. Wireless sensor networks are vulnerable against various types of external andinternal attacks being limited by computation resources, smaller memory capacity, limited battery life,processing power &amp; lack of tamper resistant packaging. This survey paper is
Style APA, Harvard, Vancouver, ISO itp.
10

Lakher, Annu, Mr Rajneesh Pachouri, and Mr Anurag Jain. "Detection and Prevention of Worm hole Attack to Improve Traffic in VANET." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 1543–53. http://dx.doi.org/10.22214/ijraset.2022.48249.

Pełny tekst źródła
Streszczenie:
Abstract: A Wireless Sensor Network (WSN) made up of spatially dispersed independent devices using sensors is vulnerable to many different types of threats and attacks due to a number of factors, including the unattended deployment in an untrusted environment, the limited network resources, the ease of network access, and the range of radio transmission. One of these weaknesses is the wormhole attack, in which a hacker sets up a low-latency link between sensor nodes in order to sabotage them, use up network resources, and steal sensitive information. This essay outlines the WSN wormhole attack
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Wormhole link"

1

LIANG, LIAO CHIA, and 廖家良. "The Performance Evaluation of Line-Added Mesh Network-Using Wormhole Routing and Virtual Channels." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/01955913943962265083.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣科技大學<br>管理研究所資訊管理學程<br>87<br>As the network technology develops rapidly, network congestion is delusory. On the other hand, parallel processing is used in many applications widely. It needs high-speed computing capability. The topology of network and parallel processing is similar, so we try to find out some better models from the parallel processing and using it in the real network. Therefore, we purpose some solutions to improve network performance. In our research, we change the allocation of physical lines that are between nodes. The number of virtual channels for each
Style APA, Harvard, Vancouver, ISO itp.
2

Micklethwait, Guy Roland. "Models of Time Travel: a comparative study using films." Phd thesis, 2012. http://hdl.handle.net/1885/9486.

Pełny tekst źródła
Streszczenie:
This research identifies the way the science of time travel is presented to the public through the medium of feature films, and discovers if this can be used to construct a comprehensive set of models about time travel and its consequences. There is no universally accepted understanding of what constitutes the nature of time. Even though the fundamental laws of physics do not prohibit time travel, scientists and philosophers do not agree about what would happen if backwards time travel ever became a reality. I identified models that scientists and philosophers have produced about the nature
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Wormhole link"

1

Garner, Ross. "On Wormholes, Link Cables, and the Limitations of Transmedia." In Entering the Multiverse. Routledge, 2024. http://dx.doi.org/10.4324/9781003480846-29.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Avresky, D. R., and Chris M. Cunningham. "On-Line Fault Recovery for Wormhole-Routed Two-Dimensional Meshes." In Fault-Tolerant Parallel and Distributed Systems. Springer US, 1998. http://dx.doi.org/10.1007/978-1-4615-5449-3_20.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

von Müller, Albrecht, and Elias Zafiris. "Borromean Link in Quantum Gravity A Topological Approach to the “ER = EPR” Conjecture: Modelling the Correspondence Between GHZ Entanglement and Planck-Scale Wormholes via the Borromean Link." In Concept and Formalization of Constellatory Self-Unfolding. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89776-9_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Satheesh Kumar, S., Sumaiya Shaikh, Nikhila Kathirisetty, Ganesh Bhaiyya Regulwar, and E. Ravi Kumar. "Fundamentals of Wireless Sensor Networks." In Advances in Computer and Electrical Engineering. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3940-4.ch002.

Pełny tekst źródła
Streszczenie:
As the current computing era is working behind digital data, it is indeed important to concentrate on climatic change, which has become dynamic. Even a few non-automation processes have been converted into automation by using IIoT and industry 4.0 revolution technologies such as data analytics, the Internet of Things, cybersecurity, and machine learning. Sensor networks (SN) play a pivotal role in the collection and transformation of data through electronic devices as sensors. The sensors that work in this stream are ultrasonic sensors that help measure the distance between two vehicles. This
Style APA, Harvard, Vancouver, ISO itp.
5

Ponnusamy, Vasaki, Naveena Devi Regunathan, Pardeep Kumar, Robithoh Annur, and Khalid Rafique. "A Review of Attacks and Countermeasures in Internet of Things and Cyber Physical Systems." In Industrial Internet of Things and Cyber-Physical Systems. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2803-7.ch001.

Pełny tekst źródła
Streszczenie:
The internet usage for commercial and public services has significantly increased over these decades to where security of information is becoming a more important issue to society. At the same time, the number of network attacks in IoT is increasing. These include distributed denial of service (DDOS) attack, phishing, trojan, and others that will cause the network information to not be secure. With the revolution in Industry 4.0 and IoT being the main asset in the Fourth Industrial Revolution, many companies spend thousands or millions to protect their networks and servers. Unfortunately, the
Style APA, Harvard, Vancouver, ISO itp.
6

Lothian, Alexis. "The Future Stops Here." In Old Futures. NYU Press, 2018. http://dx.doi.org/10.18574/nyu/9781479811748.003.0004.

Pełny tekst źródła
Streszczenie:
The first wormhole chapter uses a speculative engagement with Alfonso Cuarón’s 2006 film Children of Men to link disparate times and spaces in the book: the history of no future shown by feminist, eugenic, imperial narratives in part 1 and the affirmative prospects for queer of color futures in part 2. The major studio film, filmed in London by the Mexican director, highlights the presence in twenty-first-century transnational popular culture of tropes from the fictional futures examined in the previous pages. Cuarón’s adaptation of the 1992 novel by P. D. James underlines the ways in which ho
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Wormhole link"

1

Attir, Azeddine, Farid Nait-Abdesselam, Brahim Bensaou, and Jalel Ben-Othman. "Logical Wormhole Prevention in Optimized Link State Routing Protocol." In IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference. IEEE, 2007. http://dx.doi.org/10.1109/glocom.2007.195.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Chiu, Jih-Ching, Hong-Wei Chiu, and Ting-Tung Tsou. "Rescuing Algorithm for Link-List Wireless Network with Wormhole Mechanism." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0101.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Nait-Abdesselam, Farid, Brahim Bensaou, and Jinkyu Yoo. "Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol." In 2007 IEEE Wireless Communications and Networking Conference. IEEE, 2007. http://dx.doi.org/10.1109/wcnc.2007.576.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Banik, Arpita, and Debarshi Kumar Sanyal. "WoLiVe: Wormhole detection through link verification in wireless networks with error-prone channel." In 2015 Annual IEEE India Conference (INDICON). IEEE, 2015. http://dx.doi.org/10.1109/indicon.2015.7443311.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Aly, Moustafa, Abdullah Sultan, Gallyam Aidagulov, Devon Gwaba, and Mustapha Abbad. "Upscaling Linear to Radial Acidizing Curve in Carbonate Stimulation using Pickering Emulsified Acid." In ADIPEC. SPE, 2023. http://dx.doi.org/10.2118/216850-ms.

Pełny tekst źródła
Streszczenie:
Abstract Carbonate matrix stimulation involves injecting hydrochloric acid to partially dissolve the near-wellbore region creating a network of highly conductive channels known as wormholes. To enhance stimulation, acid-in-oil emulsions are commonly used as they reduce the rock dissolution rate. While matrix acidizing experiments were widely conducted to better comprehend the wormhole initiation, propagation, and breakthrough mechanisms, these studies involved small cylindrical cores in a one-dimensional flow geometry failing to represent the radial geometry of the field. This study examines t
Style APA, Harvard, Vancouver, ISO itp.
6

Harbin, James, and Leandro Soares Indrusiak. "Fine-Grained Link Locking Within Power and Latency Transaction Level Modelling in Wormhole Switching Non-Preemptive Networks On Chip." In Workshop. ACM Press, 2014. http://dx.doi.org/10.1145/2556863.2556865.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Prasad, P. Dilli, and R. Balamanigandan. "Design of adaptive link state routing mechanism for detecting wormhole attacks in MANET with high throughput comparing with ad hoc on-demand distance vector routing mechanism." In 2ND INTERNATIONAL INTERDISCIPLINARY SCIENTIFIC CONFERENCE ON GREEN ENERGY, ENVIRONMENTAL AND RENEWABLE ENERGY, ADVANCED MATERIALS, AND SUSTAINABLE DEVELOPMENT: ICGRMSD24. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0233224.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Garcia-Otero, Mariano, and Adrian Poblacion-Hernandez. "Detection of wormhole attacks in wireless sensor networks using range-free localization." In 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2012. http://dx.doi.org/10.1109/camad.2012.6335337.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Hou, Yung-Tsung, Chia-Mei Chen, and Bingchiang Jeng. "Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks." In Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/iihmsp.2007.4457790.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bedewi, M., A. Andreev, V. Khoriakov, K. Mogensen, and R. Burke. "Design of Limited-Entry Completions Using Near-Wellbore Simulator for Effective Acid Stimulation of Heterogeneous Carbonates." In ADIPEC. SPE, 2023. http://dx.doi.org/10.2118/216994-ms.

Pełny tekst źródła
Streszczenie:
Abstract Limited-entry liners (LEL) have predominantly been deployed in carbonate formations with only moderate variation in reservoir properties. In this work, a detailed numerical analysis was applied to investigate how the hole-spacing design can be tailored for effective stimulation of heterogeneous carbonate formations completed with long laterals. The base case is a well with a 10,000 ft reservoir section with a permeability of 1mD completed with a 4.5in LEL with 3mm and 4mm holes pre-drilled at variable hole spacing. A commercial near-wellbore simulator was used during this work, couple
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!