Nostalgia
发表于 2025-3-25 05:25:28
A Metric for Adaptive Routing on Trustworthy Pathsate our approach, we simulate different routing algorithms and compare their performance in the presence of one or more malicious nodes in a two-dimensional torus mesh. Our results show that the LET metric allows adaptive routing algorithms to effectively identify and circumvent malicious nodes.
血统
发表于 2025-3-25 08:07:55
http://reply.papertrans.cn/71/7019/701824/701824_22.png
悲观
发表于 2025-3-25 12:56:47
http://reply.papertrans.cn/71/7019/701824/701824_23.png
欺骗手段
发表于 2025-3-25 17:40:26
http://reply.papertrans.cn/71/7019/701824/701824_24.png
载货清单
发表于 2025-3-25 21:16:58
Jan Camenisch,Doğan KesdoğanIncludes supplementary material:
啮齿动物
发表于 2025-3-26 02:46:49
978-3-319-39027-7IFIP International Federation for Information Processing 2016
倔强不能
发表于 2025-3-26 04:37:24
http://reply.papertrans.cn/71/7019/701824/701824_27.png
white-matter
发表于 2025-3-26 09:45:55
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/o/image/701824.jpg
Gleason-score
发表于 2025-3-26 13:52:38
https://doi.org/10.1007/978-3-319-39028-4application security; cryptography; formal methods; network security; theory of security; anomaly detecti
sundowning
发表于 2025-3-26 20:37:37
http://reply.papertrans.cn/71/7019/701824/701824_30.png