• Nenhum resultado encontrado

[PDF] Top 20 COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

Has 10000 "COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS" found on our website. Below are the top 20 most common "COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS".

COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

... is the destination node and uses the reverse route to reply node ...D. The simple idea behind this routing is flooding done with nodes in the ...forwards the request only ... See full document

15

Prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm

Prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm

... The Mobile ad-hoc network (MANET) is a collection of wireless mobile node in which each node can communicate with other node without use of predefined ...lot of efficient ... See full document

5

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

... for the most vulnerable Mobile Adhoc Networks ...Use of Fuzzy Inference System (FIS) in the design of IDS is proven to be efficient in detecting routing ... See full document

5

Guard against cooperative black hole attack in Mobile Ad-Hoc Network

Guard against cooperative black hole attack in Mobile Ad-Hoc Network

... A mobile ad-hoc network [1] [2] is a self organizing network that consists of mobile nodes that are capable of communicating with each other without the help of fixed ...On ... See full document

6

Impact of Black Hole and Neighbor Attack on AOMDV Routing Protocol

Impact of Black Hole and Neighbor Attack on AOMDV Routing Protocol

... A Mobile Ad hoc Networks (MANETs) is defined as a wireless network of mobile nodes communicating with each other in a multi-hop fashion without the support of any fixed ... See full document

10

Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks

Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks

... chain of cooperating malicious nodes (black and gray hole nodes) in ad hoc ...network. In this technique initially a backbone network of strong nodes (capable ... See full document

6

Charged black holes in Einsteinian cubic gravity and nonuniqueness

Charged black holes in Einsteinian cubic gravity and nonuniqueness

... are the simplest objects in the ...deformations of spacetime geometry and can exist even devoid of ...matter. In general relativity, (electro)vacuum black holes are ... See full document

8

Born-infeld corrections to the entropy function of heterotic black holes

Born-infeld corrections to the entropy function of heterotic black holes

... corrections of Born-Infeld type terms on the entropy of extremal black holes have not been computed thus far and their exact dependence is not ...mechanism in more general ... See full document

9

Integrability of Spinning Particle Motion in Higher-Dimensional Rotating Black Hole Spacetimes

Integrability of Spinning Particle Motion in Higher-Dimensional Rotating Black Hole Spacetimes

... integrability of the bosonic part of the spinning particle motion in this ...true in any dimension. Let us emphasize that in this Letter we have not dealt with the ... See full document

5

Constructing the National Canon in Ireland and Macedonia: The Function of Folklore in the Plays The Countess Cathleen and The Land of Heart’s Desire by William Butler Yeats, and Proud Flesh and The Black Hole by Goran Stefanovski and Their Role in Strengt

Constructing the National Canon in Ireland and Macedonia: The Function of Folklore in the Plays The Countess Cathleen and The Land of Heart’s Desire by William Butler Yeats, and Proud Flesh and The Black Hole by Goran Stefanovski and Their Role in Strengt

... Considering the historical circumstances, as well as the efforts of intellectuals to present such an identity built on stories from the past emphasizing the fact that folklore needs to ... See full document

76

Braz. J. Phys.  vol.32 número2A

Braz. J. Phys. vol.32 número2A

... the hole probability densities for the dierent energy levels. The solid lines orrespond to the hole probability density[r] ... See full document

6

Braz. J. Phys.  vol.39 número4

Braz. J. Phys. vol.39 número4

... problems and prospects inherent in a more exact theory of quantum gravity, yet to be ...prohibiting black holes altogether (which would eliminate singularities and also solve the ... See full document

4

Converting of Matter to Nuclear Energy by AB-Generator

Converting of Matter to Nuclear Energy by AB-Generator

... make the theory of general relativity break down ...put the creation of black holes firmly out of reach of any high energy process occurring on or near the ... See full document

11

Electron in higher-dimensional weakly charged rotating black hole spacetimes

Electron in higher-dimensional weakly charged rotating black hole spacetimes

... [ 16 ] that the charged particle equations in higher-dimensional rotating black holes with a test elec- tric field proportional to the primary (timelike) Killing vector field are complet[r] ... See full document

13

Bounded energy waves on the black hole interior of Reissner–Nordström–de Sitter

Bounded energy waves on the black hole interior of Reissner–Nordström–de Sitter

... formulation of SCC that forbids the generic existence of continuous extensions of the metric with squared integrable connection ...solve the field equations, even in a ... See full document

23

J. Braz. Soc. Mech. Sci. & Eng.  vol.34 número especial 2

J. Braz. Soc. Mech. Sci. & Eng. vol.34 número especial 2

... requirements of production engineering for a precision hole are to ensure the required quality as well as minimal production ...costs. The interactions between machine, tool and ... See full document

5

Rev. Esc. Minas  vol.66 número3

Rev. Esc. Minas vol.66 número3

... analysis of the reconciliation system, generating serious consequences to the operation, especially when mining reaches poorer or more heterogeneous areas of the ...practices, ... See full document

7

Effect of the Distance Between Impact Point and Hole Position and Non-Perpendicular Holes on the Impact Strength of Composite Laminates

Effect of the Distance Between Impact Point and Hole Position and Non-Perpendicular Holes on the Impact Strength of Composite Laminates

... shows the geometry of the CFRP specimens used in the flexural and impact ...from the thin plates and the dimensions are, respectively, ...3 and ... See full document

6

CROSS LAYER DESIGN FOR POWER CONTROL AND LINK AVAILABILITY IN MOBILE ADHOC NETWORKS

CROSS LAYER DESIGN FOR POWER CONTROL AND LINK AVAILABILITY IN MOBILE ADHOC NETWORKS

... changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc ...networks. ... See full document

17

SOCIAL ECONOMY – A FORM OF INCLUSION AND OF ''REACTIVATING'' OF LABOR IN THE CONTEXT OF THE CURRENT CRISIS

SOCIAL ECONOMY – A FORM OF INCLUSION AND OF ''REACTIVATING'' OF LABOR IN THE CONTEXT OF THE CURRENT CRISIS

... Despite the exigencies of the European Union regarding the active inclusion , which means to ensure labor markets for those looking for a job and for the disadvantaged persons , ... See full document

13

Show all 10000 documents...