×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [selfish node]
Documents
Secure routing in Wireless sensor Networks: Attacks and Countermeasures AUTHORS: CHRIS KARLOF AND DAVID WAGNER UNIVERSITY OF CALIFORNIA AT BERKELEY, BERKELEY,
219 views
Documents
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar
218 views
Documents
The detection of routing misbehavior in mobile ad hoc networks
341 views
Documents
The detection of routing misbehavior in mobile ad hoc networks
602 views
Documents
Detection of-malicious-nodes-in-mobile-adhoc-network-vijendra-pratap-singh-sanjay-sachan1
83 views
Documents
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University
215 views
Documents
Overlay Network Creation and Maintenance with Selfish Users Georgios Smaragdakis Dissertation committee members: Azer Bestavros, Nikolaos Laoutaris, John
222 views
Documents
Routing Security in Ad Hoc Networks Justin Lomheim Shirshanka Das
219 views
Documents
1 Distributed Selfish Replication Nikolaos Laoutaris Orestis Telelis Vassilios Zissimopoulos Ioannis Stavrakakis {laoutaris,telelis,vassilis,ioannis}@di.uoa.gr
223 views
Documents
Ch 6. Security in WMNs Myungchul Kim
[email protected]
216 views
Documents
Routing Security in Ad Hoc Networks
59 views