Gotowa bibliografia na temat „Wormhole link”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Wormhole link”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Wormhole link"
Samman, Faizal A., Thomas Hollstein, and Manfred Glesner. "Networks-On-Chip Based on Dynamic Wormhole Packet Identity Mapping Management." VLSI Design 2009 (April 7, 2009): 1–15. http://dx.doi.org/10.1155/2009/941701.
Pełny tekst źródłaSafitri, Nini Kurnia, Andy Hidayat Jatmika, and Moh Ali Albar. "Deteksi dan Pencegahan Serangan Wormhole pada Protokol Routing AOMDV menggunakan Gabungan Metode Delphi dan RTT-TC pada Jaringan MANET." Journal of Computer Science and Informatics Engineering (J-Cosine) 3, no. 1 (2019): 49–55. http://dx.doi.org/10.29303/jcosine.v3i1.242.
Pełny tekst źródłaK*, Parvathy. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering 10, no. 1 (2021): 199–203. http://dx.doi.org/10.35940/ijrte.a5873.0510121.
Pełny tekst źródłaParvathy.K. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 1 (2021): 199–203. https://doi.org/10.35940/ijrte.A5873.0510121.
Pełny tekst źródłaHanif, Maria, Humaira Ashraf, Zakia Jalil, et al. "AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks." Electronics 11, no. 15 (2022): 2324. http://dx.doi.org/10.3390/electronics11152324.
Pełny tekst źródłaGuz, Zvika, Isask'har Walter, Evgeny Bolotin, Israel Cidon, Ran Ginosar, and Avinoam Kolodny. "Network Delays and Link Capacities in Application-Specific Wormhole NoCs." VLSI Design 2007 (April 23, 2007): 1–15. http://dx.doi.org/10.1155/2007/90941.
Pełny tekst źródłaBalkisu, Musa Hari, and Ahmad Aminu Ali. "Attention Based Gated Recurrent Neural Network for Wormhole Attack Detection in MANETs." International Journal of Computer Science and Information Technology Research 11, no. 4 (2023): 20–28. https://doi.org/10.5281/zenodo.8424623.
Pełny tekst źródłaBen-Itzhak, Yaniv, Israel Cidon, and Avinoam Kolodny. "Average latency and link utilization analysis of heterogeneous wormhole NoCs." Integration, the VLSI Journal 51 (September 2015): 92–106. http://dx.doi.org/10.1016/j.vlsi.2015.07.002.
Pełny tekst źródłaInternational, Journal on AdHoc Networking Systems (IJANS). "A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network." International Journal on AdHoc Networking Systems (IJANS) 2, no. 4 (2024): 37–50. https://doi.org/10.5121/ijans.2012.2404.
Pełny tekst źródłaLakher, Annu, Mr Rajneesh Pachouri, and Mr Anurag Jain. "Detection and Prevention of Worm hole Attack to Improve Traffic in VANET." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 1543–53. http://dx.doi.org/10.22214/ijraset.2022.48249.
Pełny tekst źródłaRozprawy doktorskie na temat "Wormhole link"
LIANG, LIAO CHIA, and 廖家良. "The Performance Evaluation of Line-Added Mesh Network-Using Wormhole Routing and Virtual Channels." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/01955913943962265083.
Pełny tekst źródłaMicklethwait, Guy Roland. "Models of Time Travel: a comparative study using films." Phd thesis, 2012. http://hdl.handle.net/1885/9486.
Pełny tekst źródłaCzęści książek na temat "Wormhole link"
Garner, Ross. "On Wormholes, Link Cables, and the Limitations of Transmedia." In Entering the Multiverse. Routledge, 2024. http://dx.doi.org/10.4324/9781003480846-29.
Pełny tekst źródłaAvresky, D. R., and Chris M. Cunningham. "On-Line Fault Recovery for Wormhole-Routed Two-Dimensional Meshes." In Fault-Tolerant Parallel and Distributed Systems. Springer US, 1998. http://dx.doi.org/10.1007/978-1-4615-5449-3_20.
Pełny tekst źródłavon Müller, Albrecht, and Elias Zafiris. "Borromean Link in Quantum Gravity A Topological Approach to the “ER = EPR” Conjecture: Modelling the Correspondence Between GHZ Entanglement and Planck-Scale Wormholes via the Borromean Link." In Concept and Formalization of Constellatory Self-Unfolding. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89776-9_7.
Pełny tekst źródłaSatheesh Kumar, S., Sumaiya Shaikh, Nikhila Kathirisetty, Ganesh Bhaiyya Regulwar, and E. Ravi Kumar. "Fundamentals of Wireless Sensor Networks." In Advances in Computer and Electrical Engineering. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3940-4.ch002.
Pełny tekst źródłaPonnusamy, Vasaki, Naveena Devi Regunathan, Pardeep Kumar, Robithoh Annur, and Khalid Rafique. "A Review of Attacks and Countermeasures in Internet of Things and Cyber Physical Systems." In Industrial Internet of Things and Cyber-Physical Systems. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2803-7.ch001.
Pełny tekst źródłaLothian, Alexis. "The Future Stops Here." In Old Futures. NYU Press, 2018. http://dx.doi.org/10.18574/nyu/9781479811748.003.0004.
Pełny tekst źródłaStreszczenia konferencji na temat "Wormhole link"
Attir, Azeddine, Farid Nait-Abdesselam, Brahim Bensaou, and Jalel Ben-Othman. "Logical Wormhole Prevention in Optimized Link State Routing Protocol." In IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference. IEEE, 2007. http://dx.doi.org/10.1109/glocom.2007.195.
Pełny tekst źródłaChiu, Jih-Ching, Hong-Wei Chiu, and Ting-Tung Tsou. "Rescuing Algorithm for Link-List Wireless Network with Wormhole Mechanism." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0101.
Pełny tekst źródłaNait-Abdesselam, Farid, Brahim Bensaou, and Jinkyu Yoo. "Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol." In 2007 IEEE Wireless Communications and Networking Conference. IEEE, 2007. http://dx.doi.org/10.1109/wcnc.2007.576.
Pełny tekst źródłaBanik, Arpita, and Debarshi Kumar Sanyal. "WoLiVe: Wormhole detection through link verification in wireless networks with error-prone channel." In 2015 Annual IEEE India Conference (INDICON). IEEE, 2015. http://dx.doi.org/10.1109/indicon.2015.7443311.
Pełny tekst źródłaAly, Moustafa, Abdullah Sultan, Gallyam Aidagulov, Devon Gwaba, and Mustapha Abbad. "Upscaling Linear to Radial Acidizing Curve in Carbonate Stimulation using Pickering Emulsified Acid." In ADIPEC. SPE, 2023. http://dx.doi.org/10.2118/216850-ms.
Pełny tekst źródłaHarbin, James, and Leandro Soares Indrusiak. "Fine-Grained Link Locking Within Power and Latency Transaction Level Modelling in Wormhole Switching Non-Preemptive Networks On Chip." In Workshop. ACM Press, 2014. http://dx.doi.org/10.1145/2556863.2556865.
Pełny tekst źródłaPrasad, P. Dilli, and R. Balamanigandan. "Design of adaptive link state routing mechanism for detecting wormhole attacks in MANET with high throughput comparing with ad hoc on-demand distance vector routing mechanism." In 2ND INTERNATIONAL INTERDISCIPLINARY SCIENTIFIC CONFERENCE ON GREEN ENERGY, ENVIRONMENTAL AND RENEWABLE ENERGY, ADVANCED MATERIALS, AND SUSTAINABLE DEVELOPMENT: ICGRMSD24. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0233224.
Pełny tekst źródłaGarcia-Otero, Mariano, and Adrian Poblacion-Hernandez. "Detection of wormhole attacks in wireless sensor networks using range-free localization." In 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2012. http://dx.doi.org/10.1109/camad.2012.6335337.
Pełny tekst źródłaHou, Yung-Tsung, Chia-Mei Chen, and Bingchiang Jeng. "Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks." In Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/iihmsp.2007.4457790.
Pełny tekst źródłaBedewi, M., A. Andreev, V. Khoriakov, K. Mogensen, and R. Burke. "Design of Limited-Entry Completions Using Near-Wellbore Simulator for Effective Acid Stimulation of Heterogeneous Carbonates." In ADIPEC. SPE, 2023. http://dx.doi.org/10.2118/216994-ms.
Pełny tekst źródła