Folgen
Nadav Schweitzer
Nadav Schweitzer
Jerusalem College of Technology
Bestätigte E-Mail-Adresse bei jct.ac.il
Titel
Zitiert von
Zitiert von
Jahr
Contradiction based gray-hole attack minimization for ad-hoc networks
N Schweitzer, A Stulman, RD Margalit, A Shabtai
IEEE Transactions on Mobile Computing 16 (8), 2174-2183, 2016
1012016
Mitigating denial of service attacks in OLSR protocol using fictitious nodes
N Schweitzer, A Stulman, A Shabtai, RD Margalit
IEEE Transactions on Mobile Computing 15 (1), 163-172, 2015
662015
Network bottlenecks in OLSR based ad-hoc networks
N Schweitzer, A Stulman, T Hirst, RD Margalit, A Shabtai
Ad Hoc Networks 88, 36-54, 2019
222019
Automatically identifying citations in Hebrew-Aramaic documents
Y HaCohen-Kerner, N Schweitzer, D Mughaz
Cybernetics and Systems: An International Journal 42 (3), 180-197, 2011
132011
Automatic identification of biblical quotations in Hebrew-Aramaic documents
Y HaCohen-Kerner, N Schweitzer, Y Shoham
International Conference on Knowledge Discovery and Information Retrieval 2 …, 2010
62010
Detecting bottlenecks on-the-fly in OLSR based MANETs
N Schweitzer, A Stulman, T Hirst, RD Margalit, M Armon, A Shabtai
2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel …, 2014
52014
Measuring direct and indirect authorial influence in historical corpora
M Koppel, N Schweitzer
Journal of the Association for Information Science and Technology 65 (10 …, 2014
52014
Persuasive: A node isolation attack variant for OLSR-based MANETs and its mitigation
N Schweitzer, L Cohen, A Dvir, A Stulman
Ad Hoc Networks 148, 103192, 2023
42023
Network wormhole attacks without a traditional wormhole
N Schweitzer, A Dvir, A Stulman
Ad Hoc Networks 151, 103286, 2023
22023
Effectiveness of DCFM on different mobility models
N Schweitzer, A Stulman
2020 8th International Conference on Wireless Networks and Mobile …, 2020
22020
Neighbor contamination to achieve complete bottleneck control
N Schweitzer, A Stulman, A Shabtai
Proceedings of the 19th ACM International Conference on Modeling, Analysis …, 2016
22016
Achieving manet protection without the use of superfluous fictitious nodes
N Schweitzer, L Cohen, T Hirst, A Dvir, A Stulman
Computer Communications 229, 107978, 2025
2025
Tracking Author's Influence in Historical Textual Corpora
N Schweitzer
Bar Ilan University. Department of Mathematics and Computer Science., 2012
2012
Are Fictitious Nodes Needed at All?
N Schweitzer, L Cohen, T Hirst, A Dvir, A Stulman
Available at SSRN 4356714, 0
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–14