The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Wormhole with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-1992 (23) 1993 (28) 1994 (46) 1995 (50) 1996 (54) 1997 (70) 1998 (55) 1999 (47) 2000 (63) 2001 (48) 2002 (39) 2003 (36) 2004 (36) 2005 (36) 2006 (48) 2007 (55) 2008 (45) 2009 (46) 2010 (31) 2011 (25) 2012 (22) 2013 (20) 2014 (27) 2015 (19) 2016 (24) 2017 (20) 2018 (15) 2019 (26) 2020-2021 (28) 2022 (20) 2023 (25) 2024 (5)
Publication types (Num. hits)
article(456) inproceedings(668) phdthesis(8)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1392 occurrences of 394 keywords

Results
Found 1132 publication records. Showing 1132 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Pranav Kumar Singh, Rahul Raj Gupta, Sunit Kumar Nandi, Sukumar Nandi Machine Learning Based Approach to Detect Wormhole Attack in VANETs. Search on Bibsonomy AINA Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Xingbo Wu, Fan Ni, Song Jiang 0001 Wormhole: A Fast Ordered Index for In-memory Data Management. Search on Bibsonomy EuroSys The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Shams Qazi, Raad Raad, Yi Mu 0001, Willy Susilo Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Jianpo Li, Dong Wang, Yanjiao Wang Security DV-hop localisation algorithm against wormhole attack in wireless sensor network. Search on Bibsonomy IET Wirel. Sens. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Jayashree Padmanabhan, Venkatesh Manickavasagam Scalable and Distributed Detection Analysis on Wormhole Links in Wireless Sensor Networks for Networked Systems. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Xingbo Wu, Fan Ni, Song Jiang 0001 Wormhole: A Fast Ordered Index for In-memory Data Management. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
15Xiaoli Li 0008, Hongxing Rui Block-Centered Finite Difference Method for Simulating Compressible Wormhole Propagation. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Manish Patel, Akshai Aggarwal, Nirbhay Chaubey Detection of wormhole attacks in mobility-based wireless sensor networks. Search on Bibsonomy Int. J. Commun. Networks Distributed Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15T. Divya Sai Keerthi, Pallapa Venkataram Confirmation of wormhole attack in MANETs using honeypot. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Pericle Perazzo, Carlo Vallati, Dario Varano, Giuseppe Anastasi, Gianluca Dini Implementation of a wormhole attack against a rpl network: Challenges and effects. Search on Bibsonomy WONS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15WenYang Wang, Takashi Minohara Poster: Wormhole Attacks on Asynchronous Duty-Cycling Sensor Networks and Their Countermeasures. Search on Bibsonomy EWSN The full citation details ... 2018 DBLP  BibTeX  RDF
15Frédéric Giroudot, Ahlem Mifdaoui Work-in-Progress: Extending Buffer-Aware Worst-Case Timing Analysis of Wormhole NoCs. Search on Bibsonomy RTSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Jianing Li, Qiang Wang, Zhenliang Gao An Improved Detecting Mechanism against Wormhole Attacks in Delay Tolerant Networks. Search on Bibsonomy WCSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Mehrnaz Moudi, Mohamed Othman, Kweh Yeah Lun, Amir Rizaan Abdul Rahiman Mathematical Modelling of Wormhole-Routed x-Folded TM Topology in the Presence of Uniform Traffic. Search on Bibsonomy ICCS (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Frédéric Giroudot, Ahlem Mifdaoui Buffer-Aware Worst-Case Timing Analysis of Wormhole NoCs Using Network Calculus. Search on Bibsonomy RTAS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Hossein As'adi, Alireza Keshavarz-Haddad, Ali Jamshidi 0001 A New Statistical Method for Wormhole Attack Detection in MANETs. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Sayan Majumder, Debika Bhattacharyya Mitigating wormhole attack in MANET using absolute deviation statistical approach. Search on Bibsonomy CCWC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Zongliang ZhuanSun, Keqiu Li, Guolong Chen Multipath routing algorithm for application-specific wormhole NoCs. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Mukesh Kumar, Kamlesh Dutta Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Shahram Jamali, Reza Fotohi DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. Search on Bibsonomy J. Supercomput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Xiaoli Li 0008, Hongxing Rui Characteristic block-centered finite difference method for simulating incompressible wormhole propagation. Search on Bibsonomy Comput. Math. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Qin Xiong, Fei Wu 0005, Zhonghai Lu, Changsheng Xie Extending Real-Time Analysis for Wormhole NoCs. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Parvinder Kaur, Dalveer Kaur, Rajiv Mahajan Wormhole Attack Detection Technique in Mobile Ad Hoc Networks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15S. B. Geetha, Venkanagouda C. Patil Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Parvinder Kaur, Dalveer Kaur, Rajiv Mahajan Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Çaglar Gülçehre, Sarath Chandar, Yoshua Bengio Memory Augmented Neural Networks with Wormhole Connections. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
15Gulshan Kumar, Mritunjay Kumar Rai, Rahul Saha Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15G. Akilarasu, S. Mercy Shalinie Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Amit Kr. Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Mladen Slijepcevic, Carles Hernández 0001, Jaume Abella 0001, Francisco J. Cazorla Boosting Guaranteed Performance in Wormhole NoCs with Probabilistic Timing Analysis. Search on Bibsonomy DSD The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Benoît Dupont de Dinechin, Amaury Graillat Feed-Forward Routing for the Wormhole Switching Network-on-Chip of the Kalray MPPA2 Processor. Search on Bibsonomy NoCArc@MICRO The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Rui Ma 0004, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang Defenses Against Wormhole Attacks in Wireless Sensor Networks. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Sami S. Albouq, Erik M. Fredericks Detection and Avoidance of Wormhole Attacks in Connected Vehicles. Search on Bibsonomy DIVANet@MSWiM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Zhenyu Liu, Xiongfeng Deng, Jiajun Li A secure localization algorithm based on reputation against wormhole attack in UWSNS. Search on Bibsonomy ISPACS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet Through the wormhole: tracking invisible MPLS tunnels. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Jonny Karlsson A unified wormhole attack detection framework for mobile ad hoc networks. Search on Bibsonomy 2017   RDF
15Meng Liu 0001 Real-Time Communication over Wormhole-Switched On-Chip Networks. Search on Bibsonomy 2017   RDF
15Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay, Pragma Kar Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network. Search on Bibsonomy J. Comput. Networks Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15GuHsin Lai Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Borislav Nikolic, Leandro Soares Indrusiak, Stefan M. Petters A Tighter Real-Time Communication Analysis for Wormhole-Switched Priority-Preemptive NoCs. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Ahlem Mifdaoui, Hamid Ayed Buffer-aware Worst Case Timing Analysis of Wormhole Network On Chip. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Leandro Soares Indrusiak, Alan Burns 0001, Borislav Nikolic Analysis of buffering effects on hard real-time priority-preemptive wormhole networks. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi EPSA: an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15George L. Sutphin, J. Matthew Mahoney, Keith S. Sheppard, David O. Walton, Ron Korstanje WORMHOLE: Novel Least Diverged Ortholog Prediction through Machine Learning. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Rupinder Singh, Jatinder Singh, Ravinder Singh WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks. Search on Bibsonomy Mob. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15James Harbin, Leandro Soares Indrusiak Comparative performance evaluation of latency and link dynamic power consumption modelling algorithms in wormhole switching networks on chip. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Junpei Sugioka, Yasuyuki Miura A proposal of mixture communication of the wormhole and single-flit routing. Search on Bibsonomy ICCE-TW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Milos Panic, Carles Hernández 0001, Jaume Abella 0001, Antoni Roca 0001, Eduardo Quiñones, Francisco J. Cazorla Improving performance guarantees in wormhole mesh NoC designs. Search on Bibsonomy DATE The full citation details ... 2016 DBLP  BibTeX  RDF
15Maggie X. Cheng, Yi Ling, Wei Biao Wu In-band wormhole detection in wireless ad hoc networks using change point detection method. Search on Bibsonomy ICC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Niki Tsitsiroudi, Panagiotis G. Sarigiannidis, Eirini D. Karapistoli, Anastasios A. Economides EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs. Search on Bibsonomy WMNC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jonny Karlsson, Göran Pulkkis, Laurence S. Dooley A packet traversal time per hop based adaptive wormhole detection algorithm for MANETs. Search on Bibsonomy SoftCOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Sudhir Bagade, Vijay T. Raisinghani JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Takashi Minohara, Kyosuke Nishiyama Poster: Detection of Wormhole Attack on Wireless Sensor Networks in Duty-Cycling Operation. Search on Bibsonomy EWSN The full citation details ... 2016 DBLP  BibTeX  RDF
15Richa Mudgal, Rohit Gupta An Efficient Approach for Wormhole detection in MANET. Search on Bibsonomy ICTCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Sunil Kumar Jangir, Naveen Hemrajani Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks. Search on Bibsonomy ICTCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Ashka Shastri, Jignesh Joshi A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention. Search on Bibsonomy ICTCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Youssef Gahi, Junaid Israr, Mouhcine Guennoun Wormhole Detection in Secured BGP Networks. Search on Bibsonomy CSCloud The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Borislav Nikolic, Luís Miguel Pinho, Leandro Soares Indrusiak On Routing Flexibility of Wormhole-Switched Priority-Preemptive NoCs. Search on Bibsonomy RTCSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Milos Panic, Carles Hernández 0001, Eduardo Quiñones, Jaume Abella 0001, Francisco J. Cazorla Modeling High-Performance Wormhole NoCs for Critical Real-Time Embedded Systems. Search on Bibsonomy RTAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Qin Xiong, Zhonghai Lu, Fei Wu 0005, Changsheng Xie Real-Time Analysis for Wormhole NoC: Revisited and Revised. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yunfeng Ma Hardware-accelerated evolutionary hard real-time task mapping for wormhole network-on-chip with priority-preemptive arbitration. Search on Bibsonomy 2016   RDF
15Shiyu Ji, Tingting Chen, Sheng Zhong 0002 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Yaniv Ben-Itzhak, Israel Cidon, Avinoam Kolodny Average latency and link utilization analysis of heterogeneous wormhole NoCs. Search on Bibsonomy Integr. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15C. Ashok Baburaj, K. Alagarsamy An efficient secure routing mechanism for preventing wormhole and black hole attacks in a trusted DTN environment. Search on Bibsonomy Int. J. Wirel. Mob. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Honglong Chen, Wei Lou, Zhi Wang 0003 On providing wormhole-attack-resistant localization using conflicting sets. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Honglong Chen, Wei Lou, Zhi Wang 0003, Junfeng Wu, Zhibo Wang 0001, Aihua Xia Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Search on Bibsonomy Pervasive Mob. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Li Lu 0001, Muhammad Jawad Hussain, Guoxing Luo, Zhigang Han Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Ning Ma, Zhuo Zou, Zhonghai Lu, Li-Rong Zheng 0001 Implementing MVC Decoding on Homogeneous NoCs: Circuit Switching or Wormhole Switching. Search on Bibsonomy PDP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Leandro Soares Indrusiak, James Harbin, Alan Burns 0001 Average and Worst-Case Latency Improvements in Mixed-Criticality Wormhole Networks-on-Chip. Search on Bibsonomy ECRTS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Changlin Chen, Marius Enachescu, Sorin Dan Cotofana Enabling vertical wormhole switching in 3D NoC-bus hybrid systems. Search on Bibsonomy DATE The full citation details ... 2015 DBLP  BibTeX  RDF
15Vinesh Teotia, Sanjay Kumar Dhurandher, Isaac Woungang, Mohammad S. Obaidat Wormhole prevention using COTA mechanism in position based environment over MANETs. Search on Bibsonomy ICC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Yogeshwer Sharma, Philippe Ajoux, Petchean Ang, David Callies, Abhishek Choudhary, Laurent Demailly, Thomas Fersch, Liat Atsmon Guz, Andrzej Kotulski, Sachin Kulkarni, Sanjeev Kumar, Harry C. Li, Jun Li, Evgeniy Makeev, Kowshik Prakasam, Robbert van Renesse, Sabyasachi Roy, Pratyush Seth, Yee Jiun Song, Benjamin Wester, Kaushik Veeraraghavan, Peter Xie Wormhole: Reliable Pub-Sub to Support Geo-replicated Internet Services. Search on Bibsonomy NSDI The full citation details ... 2015 DBLP  BibTeX  RDF
15Chaitali Biswas Dutta, Utpal Biswas Specification based IDS for camouflaging wormhole attack in OLSR. Search on Bibsonomy MED The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Laure Abdallah, Mathieu Jan, Jérôme Ermont, Christian Fraboul Wormhole networks properties and their use for optimizing worst case delay analysis of many-cores. Search on Bibsonomy SIES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Meng-Hsiu Jao, Ming-Hsuan Hsieh, Kuan-Hsien He, Dai-Hua Liu, Shu-Yu Kuo, Ting-Hui Chu, Yao-Hsin Chou A Wormhole Attacks Detection Using a QTS Algorithm with MA in WSN. Search on Bibsonomy SMC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Muhammad Imran 0005, Farrukh Aslam Khan, Tauseef Jamal, Muhammad Hanif Durad Analysis of Detection Features for Wormhole Attacks in MANETs. Search on Bibsonomy FNC/MobiSPC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Masayuki Arai Reliability Improvement of Multi-path Routing for Wireless Sensor Networks and Its Application to Wormhole Attack Avoidance. Search on Bibsonomy UIC/ATC/ScalCom The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Lishi Chen, Chun-Yan Liu, Hejiao Huang Secure Routing against Wormhole Attack and Its Formal Verification based on Timed Colored Petri Net. Search on Bibsonomy Q2SWinet@MSWiM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Jiu-hu Zheng, Huanyan Qian, Lei Wang Defense Technology of Wormhole Attacks Based on Node Connectivity. Search on Bibsonomy SmartCity The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Tao Chen, Haiping Huang, Zhengyu Chen, Yiming Wu, Hao Jiang A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks. Search on Bibsonomy PAAP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15King Sun Chan, Mohammad Rafiqul Alam Topological comparison-based wormhole detection for MANET. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Shiva Shamaei, Ali Movaghar 0001 A two-phase wormhole attack detection scheme in MANETs. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Su Hu, Wenzheng Xu, Jing Lin, Xiaola Lin Probabilistic odd-even: an adaptive wormhole routing algorithm for 2D mesh network-on-chip. Search on Bibsonomy J. Supercomput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Guowei Wu, Xiaojie Chen, Lin Yao 0001, Youngjun Lee, Kangbin Yim An efficient wormhole attack detection method in wireless sensor networks. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Phillip Lee, Andrew Clark 0001, Linda Bushnell, Radha Poovendran A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Freek Verbeek, Julien Schmaltz A Decision Procedure for Deadlock-Free Routing in Wormhole Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Honglong Chen, Wendong Chen, Zhibo Wang 0001, Zhi Wang 0003, Yanjun Li 0004 Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15T. V. P. Sundararajan, S. M. Ramesh, R. Maheswar 0001, K. R. Deepak Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET. Search on Bibsonomy Wirel. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Ganesh Reddy Karri, P. Santhi Thilagam Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee, Ki-Hyung Kim Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Peng Wang, Sheng Ma, Hongyi Lu, Zhiying Wang 0003 A comprehensive comparison between virtual cut-through and wormhole routers for cache coherent Network on-Chips. Search on Bibsonomy IEICE Electron. Express The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Jorge Albericio, Joshua San Miguel, Natalie D. Enright Jerger, Andreas Moshovos Wormhole: Wisely Predicting Multidimensional Branches. Search on Bibsonomy MICRO The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zolidah Kasiran, Juliza Mohamad Throughput performance analysis of the wormhole and sybil attack in AODV. Search on Bibsonomy DICTAP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Gaurav Pareek, Ratna Kumari, Aitha Nagaraju Mobile Sensor Localization Under Wormhole Attacks: An Analysis. Search on Bibsonomy ISI (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Kris Heid, Haoyuan Ying, Christian Hochberger, Klaus Hofmann LatEst: Latency estimation and high speed evaluation for wormhole switched Networks-on-Chip. Search on Bibsonomy ReCoSoC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yue Qian, Junhui Wang Analyzing Worst-case Delay-Buffer-Equation for wormhole networks on chip. Search on Bibsonomy NORCHIP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Eirini D. Karapistoli, Panagiotis G. Sarigiannidis, Anastasios A. Economides Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks. Search on Bibsonomy SecureComm (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Shiwei Lan, Jeffrey Streets, Babak Shahbaba Wormhole Hamiltonian Monte Carlo. Search on Bibsonomy AAAI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Taimour Wehbe, Xiaofang Wang Efficient Buffer Design and Implementation for Wormhole Routers on FPGAs. Search on Bibsonomy ARC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Borislav Nikolic, Stefan M. Petters EDF as an arbitration policy for wormhole-switched priority-preemptive NoCs - Myth or fact? Search on Bibsonomy EMSOFT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 1132 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license