-
1Academic Journal
المؤلفون: T Devapriya, V Ganesan, S Velmurugan
المصدر: International Journal of Advances in Signal and Image Sciences, Vol 10, Iss 2, Pp 24-36 (2024)
مصطلحات موضوعية: malicious node detection, wireless sensor networks, rabin-karp algorithm, data integrity, energy efficiency, Biotechnology, TP248.13-248.65, Computer applications to medicine. Medical informatics, R858-859.7
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Song Luo, Lianghai Lai, Tan Hu, Xin Hu
المصدر: PeerJ Computer Science, Vol 10, p e2108 (2024)
مصطلحات موضوعية: Social Internet of Things, Malicious node detection, Machine learning, Privacy protection, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
3Academic Journal
المؤلفون: S. Remya, Manu J. Pillai, C. Arjun, Somula Ramasubbareddy, Yongyun Cho
المصدر: IEEE Access, Vol 12, Pp 58836-58850 (2024)
مصطلحات موضوعية: Low power lossy networks, routing protocol, trust-based intrusion detection system, IoT, malicious node detection, energy efficiency, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
4Academic Journal
المؤلفون: Zabeehullah, Fahim Arif, Nauman Ali Khan, Javed Iqbal, Faten Khalid Karim, Nisreen Innab, Samih M. Mostafa
المصدر: IEEE Access, Vol 12, Pp 60568-60587 (2024)
مصطلحات موضوعية: Deep reinforcement learning, Internet of Things, malicious node detection, optimal network management, routing optimization, software defined network, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
5Academic Journal
المؤلفون: Narmadha A. S., Maheswari S., Deepa S. N.
المصدر: Automatika, Vol 64, Iss 4, Pp 996-1009 (2023)
مصطلحات موضوعية: MANET, secure communication, deep neural network learning, projection pursuit regression function, watchdog malicious node detection, isolation, Control engineering systems. Automatic machinery (General), TJ212-225, Automation, T59.5
وصف الملف: electronic resource
-
6Academic Journal
المؤلفون: Ibrahim Mekawy
المصدر: Big Data and Computing Visions, Vol 3, Iss 2, Pp 70-75 (2023)
مصطلحات موضوعية: wireless sensor networks, blockchain technology, malicious node detection, security issues, centralized, distributed, Science
وصف الملف: electronic resource
-
7Academic Journal
المؤلفون: Md Zubair, Helge Janicke, Ahmad Mohsin, Leandros Maglaras, Iqbal H. Sarker
المصدر: Sensors, Vol 24, Iss 12, p 3712 (2024)
مصطلحات موضوعية: cybersecurity, malicious node detection, wireless sensor node, data balancing, ensemble learning, explainability analysis, Chemical technology, TP1-1185
وصف الملف: electronic resource
-
8Academic Journal
المؤلفون: Vinod Veeramachaneni
المصدر: Recent Innovations in Wireless Network Security, 7(1), 27-44, (2024-11-15)
مصطلحات موضوعية: IoT Security, Dynamic Trust Management, Reputation-Based Systems, Device Trustworthiness, Network Reliability, Real-Time Trust Evaluation, Adaptive Trust Models, IoT Resilience, Malicious Node Detection, Security in IoT Networks
Relation: https://zenodo.org/communities/compub; https://doi.org/10.5281/zenodo.14168510; https://doi.org/10.5281/zenodo.14168511; oai:zenodo.org:14168511
-
9Academic Journal
المؤلفون: Samira Torabi
المصدر: Computational Algorithms and Numerical Dimensions, Vol 2, Iss 1, Pp 7-11 (2023)
مصطلحات موضوعية: blockchain technology, malicious node detection, security issues, centralized, Mathematics, QA1-939
وصف الملف: electronic resource
-
10Academic Journal
المؤلفون: Muhammad Nouman, Umar Qasim, Hina Nasir, Abdullah Almasoud, Muhammad Imran, Nadeem Javaid
المصدر: IEEE Access, Vol 11, Pp 6106-6121 (2023)
مصطلحات موضوعية: Blockchain, histogram gradient boost, IPFS, malicious node detection, VBFT, WSN, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
11Academic Journal
المؤلفون: Shahid Abbas, Hina Nasir, Ahmad Almogren, Ayman Altameem, Nadeem Javaid
المصدر: IEEE Access, Vol 10, Pp 113945-113955 (2022)
مصطلحات موضوعية: Authentication, blockchain, Internet of Underwater Things, malicious node detection, privacy preservation, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
12Academic Journal
المؤلفون: Ruolan Wu, Yuling Chen, Chaoyue Tan, Yun Luo
المصدر: Applied Sciences; Volume 13; Issue 5; Pages: 2793
مصطلحات موضوعية: federated learning, malicious node detection, poisoning attacks, incentive mechanism, contract theory
جغرافية الموضوع: agris
وصف الملف: application/pdf
Relation: Computing and Artificial Intelligence; https://dx.doi.org/10.3390/app13052793
الاتاحة: https://doi.org/10.3390/app13052793
-
13Conference
المؤلفون: Zhou, Ke, Lin, Xi, Wu, Jun, Bashir, Ali, Li, Jianhua, Imran, Muhammad
مصطلحات موضوعية: Backhaul/Fronthaul network, Few-shot metric learning, Internet of Things, Malicious node detection
Relation: 2022 IEEE Global Communications Conference, GLOBECOM 2022, Virtual, online, 4-8 December 2022, 2022 IEEE Global Communications Conference, GLOBECOM 2022 - Proceedings p. 5777-5782; http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/191435; vital:17824; https://doi.org/10.1109/GLOBECOM48099.2022.10001659
-
14Academic Journal
المؤلفون: Shahid Abbas, Nadeem Javaid, Ahmad Almogren, Sardar Muhammad Gulfam, Abrar Ahmed, Ayman Radwan
المصدر: IEEE Access, Vol 9, Pp 139739-139754 (2021)
مصطلحات موضوعية: Authentication, blockchain, heuristic techniques, the Internet of Things, malicious node detection, route correctness, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
15Academic Journal
المؤلفون: Lakshmana Kumar Ramasamy, Firoz Khan K. P., Agbotiname Lucky Imoize, Joshua O. Ogbebor, Seifedine Kadry, Seungmin Rho
المصدر: IEEE Access, Vol 9, Pp 128765-128785 (2021)
مصطلحات موضوعية: Wireless sensor networks (WSNs), blockchain technology, malicious node detection, network security management, distributed consensus algorithm, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
16Academic Journal
المؤلفون: Sana Amjad, Shahid Abbas, Zain Abubaker, Mohammed H. Alsharif, Abu Jahid, Nadeem Javaid
المصدر: Sensors; Volume 22; Issue 5; Pages: 1972
مصطلحات موضوعية: blockchain, clustering, authentication, malicious node detection, LEACH protocol, service provisioning, interplanetary file system, security
وصف الملف: application/pdf
Relation: Physical Sensors; https://dx.doi.org/10.3390/s22051972
الاتاحة: https://doi.org/10.3390/s22051972
-
17
المؤلفون: Mahbooba, Basim
المساهمون: Serrano, Martin, Ministry of Higher Education and Scientific Research (Iraq)
مصطلحات موضوعية: Malicious node detection, IoT security, Computer Science, Science and Engineering, Network security, Information technology, IoT security, Malicious node detection, Trust Machine Learning and Network security, Trust Machine Learning
-
18Academic Journal
المؤلفون: Gopal, R.1, Parthasarathy, V.2
المصدر: Asian Journal of Research in Social Sciences and Humanities 7(2):165-175. 2017
-
19Academic Journal
المؤلفون: Md Minhajul Islam*, amp Dr. Ravindra Kumar Gupta
المصدر: GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES, 6(5), 233-237, (2019-05-17)
مصطلحات موضوعية: Malicious Node Detection, AODV, efficiency, routing, packets delivery ratio, congestion control & MANETS
Relation: https://doi.org/10.5281/zenodo.2878144; https://doi.org/10.5281/zenodo.2878145; oai:zenodo.org:2878145
-
20Academic Journal
المؤلفون: Boqi Gao, Daichi Amagata, Takahiro Hara, Takuya Maekawa
المصدر: Journal of Information Processing. 2020, 28:689