[PDF][PDF] Malicious attacks modelling: a prevention approach for ad hoc network security

HA Talib, RB Alothman… - Indonesian Journal of …, 2023 - academia.edu
As a result of the expansions that have taken place in the field of networking and the
increase in the number of users of networks, there have recently been breakthroughs made …

[PDF][PDF] A Survey of Different Security Methods in the Physical Layer of TCP/IP Model

NR Saadallah, AK Alhafid, HA Al-Tayyar… - Eurasian Research …, 2021 - researchgate.net
In the previous two decades, cybersecurity risks and challenges in communications
networks, especially in wireless networks, have increased tremendously. Wireless networks …

[PDF][PDF] Algorithm and data encoding/decoding devices based on two-dimensional modular correction codes.

V Yatskiv, T Tsavolyk, N Yatskiv, V Koval, S Ivasiev - IntelITSIS, 2023 - ceur-ws.org
In the paper, an error detection and correction algorithm was developed on the basis of
modular correcting codes and a two-dimensional scheme. The developed algorithm …