[PDF][PDF] International journal of advanced research in computer science and software engineering

AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …

Fuzzy logic based DSR trust estimation routing protocol for MANET using evolutionary algorithms

VK Kalimuthu, G Samydurai - Tehnički vjesnik, 2021 - hrcak.srce.hr
Sažetak In MANET attaining consistent routing is a main problem due to several reasons
such as lack of static infrastructure, exposed transmission medium, energetic network …

Prevention of ant mills in pheromone-based search algorithm for robot swarms

AR Cheraghi, J Peters, K Graffi - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Computer scientists use animal-based phenomenon as source of inspiration to develop
swarm algorithm and simulate their behaviors. One example is ants foraging. For finding …

Analysis of denial of service impact on data routing in mobile eHealth wireless mesh network

S Alanazi, K Saleem, J Al-Muhtadi… - Mobile Information …, 2016 - Wiley Online Library
Wireless mesh networks (WMNs) are a promising technology that has emerged with the
combination of several wireless networks. These wireless networks and devices …

Monitoring and management of peer-to-peer systems

KG Graffi - 2010 - tuprints.ulb.tu-darmstadt.de
The peer-to-peer paradigm has had large success in content distribution and multimedia
communication applications on the Internet. In a peer-to-peer network, the participating …

[PDF][PDF] A survey of reputation based schemes for MANET

S Abbas, M Merabti… - The 11th Annual …, 2010 - researchgate.net
Abstract___ In multihop networks such as mobile ad hoc networks selfish or misbehaving
nodes can disrupt the whole network and severely degrade network performance …

A security framework for wireless mesh networks

PS Mogre, K Graffi, M Hollick… - … and Mobile Computing, 2011 - Wiley Online Library
Abstract The class of Wireless Mesh Networks (WMN) supports an ample set of applications
including wireless community networks, radio access networks in rural or metropolitan …

Dealing with collusion attack in a trust-based manet

R Abassi - Cybernetics and Systems, 2018 - Taylor & Francis
Trust allows collaborating entities to cope with their uncertainty especially when these
collaborations are the bedrock of the network existence such as in Mobile Ad hoc NETworks …

Thwarting Sybil attackers in reputation-based scheme in mobile ad hoc networks

S Abbas, M Merabti, K Kifayat… - KSII Transactions on …, 2019 - researchonline.ljmu.ac.uk
Routing in mobile ad hoc networks is performed in a distributed fashion where each node
acts as host and router, such that it forwards incoming packets for others without relying on a …

Group rekeying based on member join history

M Tiloca, G Dini, K Rizki, S Raza - International Journal of Information …, 2020 - Springer
This paper presents GREP, a novel group rekeying scheme that leverages the history of join
events in order to achieve efficiency and high scalability. GREP rekeys the group with only …