无情 发表于 2025-3-25 06:08:50

http://reply.papertrans.cn/24/2337/233659/233659_21.png

接合 发表于 2025-3-25 11:32:55

http://reply.papertrans.cn/24/2337/233659/233659_22.png

FOR 发表于 2025-3-25 15:01:03

http://reply.papertrans.cn/24/2337/233659/233659_23.png

jettison 发表于 2025-3-25 16:38:47

Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies?sed on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory.

轻浮思想 发表于 2025-3-25 22:35:11

http://reply.papertrans.cn/24/2337/233659/233659_25.png

万神殿 发表于 2025-3-26 02:51:47

http://reply.papertrans.cn/24/2337/233659/233659_26.png

Vasoconstrictor 发表于 2025-3-26 06:02:35

Models and Theoretical Perspectivesithm based on the context of node mobility is proposed to detect the Sybil in the mobile sensor networks. Simulation results using J-SIM indicates that the algorithm is able to detect the malicious nodes up to . and also the false detection rate of nodes in the proposed method is lower than . even the Sybil nodes are added to the network.

繁荣地区 发表于 2025-3-26 08:39:05

http://reply.papertrans.cn/24/2337/233659/233659_28.png

Bereavement 发表于 2025-3-26 13:35:10

Detection of Sybil Nodes in Mobile Sensor Networks Using the Context of Nodes Mobilityithm based on the context of node mobility is proposed to detect the Sybil in the mobile sensor networks. Simulation results using J-SIM indicates that the algorithm is able to detect the malicious nodes up to . and also the false detection rate of nodes in the proposed method is lower than . even the Sybil nodes are added to the network.

misshapen 发表于 2025-3-26 16:48:45

http://reply.papertrans.cn/24/2337/233659/233659_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Computer Networks and Distributed Systems; International Sympos Amir Hossein Jahangir,Ali Movaghar,Hossein Asadi Conference proceedings 201