Nostalgia 发表于 2025-3-25 05:25:28
A Metric for Adaptive Routing on Trustworthy Pathsate our approach, we simulate different routing algorithms and compare their performance in the presence of one or more malicious nodes in a two-dimensional torus mesh. Our results show that the LET metric allows adaptive routing algorithms to effectively identify and circumvent malicious nodes.血统 发表于 2025-3-25 08:07:55
http://reply.papertrans.cn/71/7019/701824/701824_22.png悲观 发表于 2025-3-25 12:56:47
http://reply.papertrans.cn/71/7019/701824/701824_23.png欺骗手段 发表于 2025-3-25 17:40:26
http://reply.papertrans.cn/71/7019/701824/701824_24.png载货清单 发表于 2025-3-25 21:16:58
Jan Camenisch,Doğan KesdoğanIncludes supplementary material:啮齿动物 发表于 2025-3-26 02:46:49
978-3-319-39027-7IFIP International Federation for Information Processing 2016倔强不能 发表于 2025-3-26 04:37:24
http://reply.papertrans.cn/71/7019/701824/701824_27.pngwhite-matter 发表于 2025-3-26 09:45:55
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/o/image/701824.jpgGleason-score 发表于 2025-3-26 13:52:38
https://doi.org/10.1007/978-3-319-39028-4application security; cryptography; formal methods; network security; theory of security; anomaly detectisundowning 发表于 2025-3-26 20:37:37
http://reply.papertrans.cn/71/7019/701824/701824_30.png