averse 发表于 2025-3-26 21:08:21

Amalia Dache,Jonathon Sun,Dennis Espejogramming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

BORE 发表于 2025-3-27 01:17:35

http://reply.papertrans.cn/15/1445/144446/144446_32.png

annexation 发表于 2025-3-27 05:39:28

http://reply.papertrans.cn/15/1445/144446/144446_33.png

剧毒 发表于 2025-3-27 12:58:22

http://reply.papertrans.cn/15/1445/144446/144446_34.png

Morphine 发表于 2025-3-27 17:36:48

http://reply.papertrans.cn/15/1445/144446/144446_35.png

Fortify 发表于 2025-3-27 19:06:52

Hidefumi Kurakado,Tatsushi Nishi,Ziang Liuic protocols with different trade-offs between communication overload and memory cost. We extensively analyze their performance and security properties. Furthermore, their applications in different wireless sensor network scenarios are discussed in detail.

COMMA 发表于 2025-3-27 22:06:54

Ward Peeters,Alexander Ito Maitlandion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work.

尽管 发表于 2025-3-28 02:49:31

Jianxing Yu,Dongpin Hu,Ching-Hsing Wangcles when they move away from their initial locations. Finally, the proposed protocol is compared with other successful state-of-the-art routing protocols for VANETs and its effectiveness is verified via simulations.

conference 发表于 2025-3-28 06:26:56

1867-8211 covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian,

时间等 发表于 2025-3-28 13:38:17

http://reply.papertrans.cn/15/1445/144446/144446_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Ad Hoc Networks; First International Jun Zheng,Shiwen Mao,Hua Zhu Conference proceedings 2010 ICST Institute for Computer Science, Social