scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "COMPUTER networks"

1 - 10 of 686,149 results for
 "COMPUTER networks"
Results per page:

Dipper Throated Optimization for Detecting Black-Hole Attacks in MANETs.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2023, Vol. 74 Issue 1, p1905-1921. 17p.

Abstract: In terms of security and privacy, mobile ad-hoc network (MANET) continues to be in demand for additional debate and development. As more MANET applications become data-oriented, implementing a secure and reliable data transfer protocol becomes a major ...

K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 73 Issue 3, p5423-5440. 18p.

Abstract: Any number that can be uniquely determined by a graph is called graph invariants. During the most recent twenty years' innumerable numerical graph invariants have been described and used for correlation analysis. In the fast and advanced environment of...

Computer Network Information Security Monitoring System Based on Big Data Era.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 11/18/2022, p1-11. 11p.

Abstract: With the rapid advancement of society and the level of programming and the rapid development of computer technology, networking and information are playing an increasingly important role in the social life of the masses. Creating and developing a netwo...

Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET.

Publication Type: Academic Journal

Source(s): Intelligent Automation & Soft Computing. 2023, Vol. 35 Issue 1, p491-505. 15p.

Abstract: The Mobile Ad-hoc Network (MANET) is a dynamic topology that provides a variety of executions in various disciplines. The most sticky topic in organizational fields was MANET protection. MANET is helpless against various threats that affect its usabili...

An Optimized and Energy-Efficient Ad-Hoc On-Demand Distance Vector Routing Protocol Based on Dynamic Forwarding Probability (AODVI).

Publication Type: Academic Journal

Source(s): Journal of Computer Networks & Communications. 11/8/2022, Vol. 2022, p1-13. 13p.

Abstract: MANET (mobile ad-hoc network) is a wireless ad-hoc network made up of mobile devices that use peer-to-peer routing to provide network access instead of using a preexisting network infrastructure. Despite the network infrastructure's simplicity, it face...

TMTACS: Two-Tier Multi-Trust-Based Algorithm to Countermeasure the Sybil Attacks.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 73 Issue 2, p3497-3512. 16p.

Abstract: Mobile Ad hoc Networks (MANETs) have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they're authentic. These fake nodes need to be detected and deactivated for security reasons, to avoid harmi...

hXDP: Efficient Software Packet Processing on FPGA NICs.

Publication Type: Periodical

Source(s): Communications of the ACM. Aug2022, Vol. 65 Issue 8, p91-100. 8p. 5 Diagrams, 2 Charts, 4 Graphs.

Abstract: The network interface cards (NICs) of modern computers are changing to adapt to faster data rates and to help with the scaling issues of general-purpose CPU technologies. Among the ongoing innovations, the inclusion of programmable accelerators on the ...

Support-Vector-Machine-based Adaptive Scheduling in Mode 4 Communication.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 73 Issue 2, p3319-3331. 13p.

Abstract: Vehicular ad-hoc networks (VANETs) are mobile networks that use and transfer data with vehicles as the network nodes. Thus, VANETs are essentially mobile ad-hoc networks (MANETs). They allow all the nodes to communicate and connect with one another. On...

Energy Aware Load Balancing in Cloudlet Federation.

Publication Type: Academic Journal

Source(s): Journal of Engineering Research (2307-1877). 2022 Special Issue, Vol. 10, p1-13. 13p.

Abstract: With the rapid increase of compute intensive tasks and workload, the need of the hour is to manage the total workload due to resource constraints and increased cost. For complex computations where multiple computer systems are required to execute a sin...

Secure and Optimal LOADng Routing for IoT with Composite Routing Metric.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2023, Vol. 74 Issue 1, p655-669. 15p.

Abstract: Security is the one of the major challenges for routing the data between the source and destination in an Internet of Things (IoT) network. To overcome this challenge, a secure Lightweight On-demand Ad hoc Distancevector—Next Generation (LOADng) Routin...

sponsored