Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 245 matches
- 2024
- Pramod Singh Rathore, Mrinal Kanti Sarkar:
Defending Against Wormhole Attacks in Wireless Networks Using the Twofish Algorithm: A Performance Analysis. CCWC 2024: 583-588 - 2023
- Sidra Aslam, Ala Altaweel, Ibrahim Kamel:
Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis. EICC 2023: 19-25 - Sidra Aslam, Ala Altaweel, Ibrahim Kamel:
Impact Study and Analysis of Hidden-mode of Wormhole Attack in Opportunistic Mobile Networks. IIT 2023: 144-149 - 2022
- Cheng Chen, Fei Tong, Yujian Zhang, Ziyan Zhu:
A Novel Detection and Localization Scheme of Wormhole Attack in IoT Network. ASCC 2022: 1983-1988 - Anup W. Burange, V. M. Deshmukh:
Detection of Rank, Sybil and Wormhole Attacks on RPL Based Network Using Trust Mechanism. ACI@ISIC 2022: 152-162 - 2021
- Jens Rettkowski, Diana Göhringer:
Wormhole Computing in Networks-on-Chip. FPL 2021: 273-274 - Nadher Alsafwani, Musab A. M. Ali, Nooritawati Md Tahir:
Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator. ICSET 2021: 46-49 - Faheed A. F. Alenezi, Sejun Song, Baek-Young Choi:
SWANS: SDN-based Wormhole Analysis using the Neighbor Similarity for a Mobile ad hoc network (MANET). IM 2021: 653-657 - Virendra Dani, Radha Bhonde, Ayesha Mandloi:
iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network. ISDA 2021: 1002-1012 - 2020
- Charisma Samuel, Brian Martinez Alvarez, Eric Garcia Ribera, Philokypros P. Ioulianou, Vassilios G. Vassilakis:
Performance Evaluation of a Wormhole Detection Method using Round-Trip Times and Hop Counts in RPL-Based 6LoWPAN Networks. CSNDSP 2020: 1-6 - Hicham Zougagh, Noureddine Idboufker, Yousef El Mourabit, Youssef Saadi, Samir Elouaham:
Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge. IBICA 2020: 217-230 - 2019
- Mahendra Prasad, Sachin Tripathi, Keshav P. Dahal:
Wormhole attack detection in ad hoc network using machine learning technique. ICCCNT 2019: 1-7 - Rafael Leira, Lluis Gifre, Iván González, Jorge E. López de Vergara, Javier Aracil:
Wormhole: a novel big data platform for 100 Gbit/s network monitoring and beyond. ICIN 2019: 297-301 - Frédéric Giroudot, Ahlem Mifdaoui:
Tightness and computation assessment of worst-case delay bounds in wormhole networks-on-chip. RTNS 2019: 19-29 - Jessé Barreto de Barros, Mauricio Ayala-Rincón, Carlos Humberto Llanos Quintero:
Application of an Adaptive Genetic Algorithm for Task Mapping Optimisation on a Wormhole-based Real-time Network-on-Chip. SBESC 2019: 1-7 - 2018
- WenYang Wang, Takashi Minohara:
Poster: Wormhole Attacks on Asynchronous Duty-Cycling Sensor Networks and Their Countermeasures. EWSN 2018: 183-184 - René Rydhof Hansen, Christian W. Probst:
Modelling and Analysing Overlay Networks by Ambients with Wormholes. ICMU 2018: 1-4 - Frédéric Giroudot, Ahlem Mifdaoui:
Buffer-Aware Worst-Case Timing Analysis of Wormhole NoCs Using Network Calculus. RTAS 2018: 37-48 - Jianing Li, Qiang Wang, Zhenliang Gao:
An Improved Detecting Mechanism against Wormhole Attacks in Delay Tolerant Networks. WCSP 2018: 1-6 - Pericle Perazzo, Carlo Vallati, Dario Varano, Giuseppe Anastasi, Gianluca Dini:
Implementation of a wormhole attack against a rpl network: Challenges and effects. WONS 2018: 95-102 - 2017
- Benoît Dupont de Dinechin, Amaury Graillat:
Feed-Forward Routing for the Wormhole Switching Network-on-Chip of the Kalray MPPA2 Processor. NoCArc@MICRO 2017: 10:1-10:6 - Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang:
Defenses Against Wormhole Attacks in Wireless Sensor Networks. NSS 2017: 413-426 - 2016
- Youssef Gahi, Junaid Israr, Mouhcine Guennoun:
Wormhole Detection in Secured BGP Networks. CSCloud 2016: 7-11 - Takashi Minohara, Kyosuke Nishiyama:
Poster: Detection of Wormhole Attack on Wireless Sensor Networks in Duty-Cycling Operation. EWSN 2016: 281-282 - Maggie X. Cheng, Yi Ling, Wei Biao Wu:
In-band wormhole detection in wireless ad hoc networks using change point detection method. ICC 2016: 1-6 - Sunil Kumar Jangir, Naveen Hemrajani:
Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks. ICTCS 2016: 74:1-74:6 - Ashka Shastri, Jignesh Joshi:
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention. ICTCS 2016: 31:1-31:4 - 2015
- Leandro Soares Indrusiak, James Harbin, Alan Burns:
Average and Worst-Case Latency Improvements in Mixed-Criticality Wormhole Networks-on-Chip. ECRTS 2015: 47-56 - Lishi Chen, Chun-Yan Liu, Hejiao Huang:
Secure Routing against Wormhole Attack and Its Formal Verification based on Timed Colored Petri Net. Q2SWinet@MSWiM 2015: 157-164 - Tao Chen, Haiping Huang, Zhengyu Chen, Yiming Wu, Hao Jiang:
A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks. PAAP 2015: 110-115
skipping 215 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-08 12:07 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint