Nostalgia 发表于 2025-3-25 05:25:28

A Metric for Adaptive Routing on Trustworthy Pathsate our approach, we simulate different routing algorithms and compare their performance in the presence of one or more malicious nodes in a two-dimensional torus mesh. Our results show that the LET metric allows adaptive routing algorithms to effectively identify and circumvent malicious nodes.

血统 发表于 2025-3-25 08:07:55

http://reply.papertrans.cn/71/7019/701824/701824_22.png

悲观 发表于 2025-3-25 12:56:47

http://reply.papertrans.cn/71/7019/701824/701824_23.png

欺骗手段 发表于 2025-3-25 17:40:26

http://reply.papertrans.cn/71/7019/701824/701824_24.png

载货清单 发表于 2025-3-25 21:16:58

Jan Camenisch,Doğan KesdoğanIncludes supplementary material:

啮齿动物 发表于 2025-3-26 02:46:49

978-3-319-39027-7IFIP International Federation for Information Processing 2016

倔强不能 发表于 2025-3-26 04:37:24

http://reply.papertrans.cn/71/7019/701824/701824_27.png

white-matter 发表于 2025-3-26 09:45:55

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/o/image/701824.jpg

Gleason-score 发表于 2025-3-26 13:52:38

https://doi.org/10.1007/978-3-319-39028-4application security; cryptography; formal methods; network security; theory of security; anomaly detecti

sundowning 发表于 2025-3-26 20:37:37

http://reply.papertrans.cn/71/7019/701824/701824_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Open Problems in Network Security; IFIP WG 11.4 Interna Jan Camenisch,Doğan Kesdoğan Conference proceedings 2016 IFIP International Federat