全部 |
  • 全部
  • 题名
  • 作者
  • 机构
  • 关键词
  • NSTL主题词
  • 摘要
检索 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly NSTL国家科技图书文献中心

Haewon Byeon |  Mohammed E. Seno... -  《Transactions on Emerging Telecommunications Technologies》 - 2025,36(4) - e70110~ - 共14页

摘要: nodes, even at a malicious node rate of 40%. The |  percentage of malicious nodes is 3%, 5%, 7%, and 9 | %, meaning that the overall rates of malicious nodes are 9 |  communication between vehicle nodes or between vehicle nodes |  and roadside units (RSUs). Vehicle nodes, RSUs, and
关键词: Anomaly detection |  Distance-based weighted voting |  Malicious nodes |  Trust management |  Vehicular ad hoc networks

2. Detection and Localization of Malicious Nodes in Internet of Things Based on SDN NSTL国家科技图书文献中心

Xiao Jingxu |  Chang Chaowen... -  《Wireless Artificial Intelligent Computing Systems and Applications,Part II》 -  International Conference on Wireless Artificial Intelligent Computing Systems and Applications - 2025, - 465~480 - 共16页

摘要: by malicious nodes in the Internet of Things |  and location method of malicious nodes in the |  process of data flow between edge nodes. The incoming |  controller. The controller locates the malicious exchange | In order to solve the security threat caused
关键词: Internet of things |  Software defined network |  Packet verification |  Anomaly detection |  Anomaly location

3. TARRP: Trust Aware RPL Routing Protocol for IoT NSTL国家科技图书文献中心

Mostafa Nazarian Par... |  Seyyed Hamid Ghafour...... -  《International journal of communication systems》 - 2025,38(4) - e6124.1~e6124.13 - 共13页 - 被引量:1

摘要: widespread attacks of malicious nodes. In this paper, a |  malicious nodes. In addition to implementing trust, TARRP |  systems that provide the ability to detect malicious |  nodes. However, most of these researches to advance |  of nodes during data transmission, and based on
关键词: IoT |  malicious nodes |  routing |  trust models

4. AutoGMM-RWKV: A Detecting Scheme Based on Attention Mechanisms Against Selective Forwarding Attacks in Wireless Sensor Networks NSTL国家科技图书文献中心

Shihao Xie |  Yida Li... -  《IEEE internet of things journal》 - 2025,12(4) - 4403~4419 - 共17页

摘要: evaluation values assuming normal and malicious nodes |  malicious nodes. Adaptive thresholding is then used to |  detect malicious nodes by computing the mean and | . Nevertheless, the selective forwarding attacks of malicious |  nodes and diminished forwarding rates among normal
关键词: Wireless sensor networks |  Internet of Things |  Feature extraction |  Attention mechanisms |  Accuracy |  Routing |  Training |  Time series analysis |  Standards |  Quality of service

5. A novel cluster based reliable security enhancement in FANET directed by game theory NSTL国家科技图书文献中心

Shikha,Gupta |  Neetu,Sharma -  《Soft computing》 - 2025,29(2) - 1091~1106 - 共16页

摘要: protocols in identifying malicious nodes within the |  security issues influenced by the existence of malicious |  nodes. These nodes continuously engage in | Abstract The emergence of interconnected UAVs |  has given rise to the creation of flying ad hoc
关键词: FANET |  Game theory |  Cluster |  Security |  Defender |  Attacker |  Monte Carlo |  Decision tree |  Path similarity

6. A Zero-Trust Approach for Cooperative Vehicular Networks: A Motorway Use Case NSTL国家科技图书文献中心

Ben Dawson |  Hadi Tabatabaee Mala...... -  《IEEE systems, man, and cybernetics magazine》 - 2025,11(1) - 11~22 - 共12页

摘要:, uncertainty in recognizing malicious nodes, and required |  nodes as trusted are insufficient in protecting |  while supporting uncertainty in detecting malicious |  nodes in a dynamic vehicular environment. The |  results in malicious node detection accuracy, reduced
关键词: Adaptation models |  Uncertainty |  Simulation |  Road traffic |  Vehicular ad hoc networks |  Public key |  Network security |  Safety |  Vehicle dynamics |  Intelligent transportation systems...

7. Detection and Localization of Hardware-Assisted Intermittent Power Attacks in Mixed-Critical Systems NSTL国家科技图书文献中心

Sneha Agarwal |  Keshav Goel... -  《IEEE transactions on circuits and systems,I.Regular papers》 - 2025,72(2) - 586~599 - 共14页

摘要: to locate the router nodes with malicious 3PPM. The |  workload. Phase-II localizes the malicious router nodes |  Systems (NoCMCS). However, a malicious 3PPM can exploit |  nodes to orchestrate well-structured, covert power |  attacks. Detection and localization of a malicious 3PPM
关键词: Location awareness |  Runtime |  System performance |  Power system management |  Network-on-chip |  Hardware |  Robustness |  Trojan horses |  Standards |  Self-aware

8. Adaptive Clustering Hierarchical PBFT Algorithm for Secure and Efficient Blockchain-Based IoT Edge Computing NSTL国家科技图书文献中心

Zheng, Jiali |  Xie, Jincheng... -  《IEEE sensors journal》 - 2025,25(2) - 3252~3266 - 共15页

摘要: reduces the probability of malicious nodes becoming | . Specifically, as the number of nodes increases, PBFT |  primary nodes through mutual verification between the |  clustering. In the experiments testing against malicious |  nodes, the ACH-PBFT algorithm exhibited an average
关键词: Blockchains |  Internet of Things |  Clustering algorithms |  Edge computing |  Security |  Scalability |  Fault tolerant systems |  Fault tolerance |  Consensus protocol |  Heuristic algorithms...

9. Adaptive Trust Management for Data Poisoning Attacks in MEC-based FL Infrastructures NSTL国家科技图书文献中心

Basma Hathout |  Paul Shepherd... -  《IEEE Open Journal of the Communications Society》 - 2025,6 - 1~1 - 共1页

摘要: malicious nodes, maintaining the global model accuracy |  nodes. Such integration reduces latency and |  trustworthiness of these edge nodes and the integrity of their |  even in scenarios with high numbers of malicious edge |  nodes, showcasing its robustness and reliability.
关键词: Training |  Adaptation models |  Data privacy |  Accuracy |  Federated learning |  Data models |  Robustness |  Zero Trust |  Trust management |  Long short term memory

10. Trust Based Active Game Data Collection Scheme in Smart Cities NSTL国家科技图书文献中心

ZHUOQUN XIA |  ZIYU WANG... -  《ACM Transactions on Embedded Computing Systems》 - 2025,24(1) - 3~ - 共23页

摘要: malicious sensor devices may interrupt and interfere with | . Therefore, identifying the credibility of sensor nodes to |  nodes. The findings of the experiment demonstrate that |  study, enhances the accuracy of identifying malicious |  nodes by 20%, reduces the required identification time
关键词: Trust |  Game theory |  Smart city |  Regional sensitivity |  Data collection
检索条件malicious nodes
  • 检索词扩展

NSTL主题词

  • NSTL学科导航