Mostrando 2 resultados de: 2
Filtros aplicados
Subtipo de publicación
Article(2)
Área temáticas
Programación informática, programas, datos, seguridad(2)
Criminología(1)
Economía financiera(1)
Año de Publicación
2012(2)
An efficient detection and management of false accusation attacks in hierarchical ad-hoc networks
ArticleAbstract: An approach to detect abnormal activities based on reputations created individually by each node isPalabras claves:Ad-hoc network, False accusation, intrusion detection, ReputationAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusA specification based intrusion detection mechanism for the LEACH protocol
ArticleAbstract: With the improvement of the wireless communication and embedded technology, the application of wirelPalabras claves:Intrusion detection system, Low energy adaptive clustering hierarchy protocol, Misbehavior, Network performance analysis, Network simulation, security, wireless sensor networkAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopus