修饰语 发表于 2025-3-28 17:32:18

http://reply.papertrans.cn/27/2633/263270/263270_41.png

syring 发表于 2025-3-28 19:46:36

http://reply.papertrans.cn/27/2633/263270/263270_42.png

Myocarditis 发表于 2025-3-29 02:32:23

http://reply.papertrans.cn/27/2633/263270/263270_43.png

entice 发表于 2025-3-29 03:59:50

http://reply.papertrans.cn/27/2633/263270/263270_44.png

以烟熏消毒 发表于 2025-3-29 07:21:28

http://reply.papertrans.cn/27/2633/263270/263270_45.png

元音 发表于 2025-3-29 14:44:37

Certificate Revocation in Hybrid Ad Hoc Networktionally or unintentionally, to other vehicles of the VANET which should ignore such messages to protect its safety. However, public-key cryptography (PKI) is used for authentication to protect attackers from causing evils. The work also addresses to remove the malicious certificate from certificate

alliance 发表于 2025-3-29 17:29:17

NB Tree Based Intrusion Detection Technique Using Rough Set Theory Modelmechanism that strives to differentiate between legitimate and malicious activities with intent to secure the resource and henceforth establish trust. Due to this importance significant amount of research has been carried in this domain. This paper introduces concept of Rough sets in IDS as theoreti

旋转一周 发表于 2025-3-29 21:05:56

An Energy-Efficient Intrusion Detection System for MANETngs to ad hoc wireless network. Nodes in mobile network have small batteries with limited power. The huge numbers of mobile nodes in MANET makes it impractical to replace sensor node batteries. Along with that, it has open medium and wide distribution of nodes that make MANET open to various types o

Pepsin 发表于 2025-3-30 03:24:41

http://reply.papertrans.cn/27/2633/263270/263270_49.png

Cabinet 发表于 2025-3-30 04:39:37

http://reply.papertrans.cn/27/2633/263270/263270_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Data, Engineering and Applications; Volume 2 Rajesh Kumar Shukla,Jitendra Agrawal,Geetam Singh Book 2019 Springer Nature Singapore Pte Ltd