Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents
The Journal of Supercomputing
A holistic approach examining RFID design for security and privacy
The Journal of Supercomputing
Requirements and design for neutral trust management framework in unstructured networks
The Journal of Supercomputing
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
Dynamic camouflage event based malicious node detection architecture
The Journal of Supercomputing
ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks
The Journal of Supercomputing
VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks
The Journal of Supercomputing
User requirements-aware security ranking in SSL protocol
The Journal of Supercomputing
Hi-index | 0.00 |