ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Malicious node detection based on clustering techniques in network
Materials Today Proceedings
◽
10.1016/j.matpr.2021.05.111
◽
2021
◽
Author(s):
Madhavi Dhingra
◽
S.C. Jain
◽
Rakesh Singh Jadon
Keyword(s):
Malicious Node
◽
Clustering Techniques
◽
Malicious Node Detection
Download Full-text
Related Documents
Cited By
References
A Technique for Malicious Node Detection for Adaptive Data Fusion in Wireless Sensor Networks
International Journal of Scientific and Research Publications (IJSRP)
◽
10.29322/ijsrp.8.6.2018.p7868
◽
2018
◽
Vol 8
(6)
◽
Author(s):
M. Preethi
◽
Rashmi Purad
◽
D. S. Kavya
◽
H. L. Chandrakala
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Fusion
◽
Wireless Sensor
◽
Malicious Node
◽
Malicious Node Detection
Download Full-text
Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks
Environment Development and Sustainability
◽
10.1007/s10668-021-01632-5
◽
2021
◽
Author(s):
Shahid Sultan
◽
Qaisar Javaid
◽
Arif Jamal Malik
◽
Fadi Al-Turjman
◽
Muhammad Attique
Keyword(s):
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Malicious Node
◽
Malicious Node Detection
◽
Hoc Networks
Download Full-text
Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs
Wireless Networks
◽
10.1007/s11276-020-02413-0
◽
2020
◽
Vol 26
(8)
◽
pp. 5897-5917
Author(s):
S. Prabakeran
◽
T. Sethukarasi
Keyword(s):
Optimal Solution
◽
Malicious Node
◽
Malicious Node Detection
◽
Swarm Algorithm
Download Full-text
Improved Deep Convolutional Neural Network based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks
IEEE Transactions on Network Science and Engineering
◽
10.1109/tnse.2021.3098011
◽
2021
◽
pp. 1-1
Author(s):
Mohit Kumar
◽
Priya Mukherjee
◽
Kavita Verma
◽
Sahil Verma
◽
Danda B Rawat
Keyword(s):
Neural Network
◽
Wireless Sensor Networks
◽
Sensor Networks
◽
Convolutional Neural Network
◽
Data Transmission
◽
Energy Efficient
◽
Wireless Sensor
◽
Malicious Node
◽
Efficient Data
◽
Malicious Node Detection
Download Full-text
SURVEY OF WATCHDOG MECHANISM USED FOR MALICIOUS NODE DETECTION
International Journal of Advanced Research in Computer Science
◽
10.26483/ijarcs.v8i9.5144
◽
2017
◽
Vol 8
(9)
◽
pp. 453-456
Author(s):
Mrs. C. Gayathri
◽
Keyword(s):
Malicious Node
◽
Malicious Node Detection
Download Full-text
DDoS Malicious Node Detection by Jaccard and Page Rank Algorithm in Cloud Environment
International Journal of Computer Trends and Technology
◽
10.14445/22312803/ijctt-v69i5p108
◽
2021
◽
Vol 69
(5)
◽
pp. 55-59
Author(s):
Adil Hussain Mohammed
Keyword(s):
Malicious Node
◽
Cloud Environment
◽
Page Rank
◽
Malicious Node Detection
Download Full-text
Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine
2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE)
◽
10.1109/rdcape47089.2019.8979125
◽
2019
◽
Author(s):
Bhavnesh Jaint
◽
S. Indu
◽
Neeta Pandey
◽
Khushbu Pahwa
Keyword(s):
Wireless Sensor Networks
◽
Support Vector Machine
◽
Sensor Networks
◽
Wireless Sensor
◽
Support Vector
◽
Malicious Node
◽
Malicious Node Detection
Download Full-text
Hybrid Acknowledgment Scheme for Early Malicious Node Detection in Wireless Sensor Networks
Advances in Intelligent Systems and Computing - International Conference on Intelligent and Smart Computing in Data Analytics
◽
10.1007/978-981-33-6176-8_29
◽
2021
◽
pp. 263-270
Author(s):
A. Roshini
◽
K. V. D. Kiran
◽
K. V. Anudeep
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Malicious Node
◽
Malicious Node Detection
Download Full-text
Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
Wireless Personal Communications
◽
10.1007/s11277-016-3666-1
◽
2016
◽
Vol 94
(4)
◽
pp. 2549-2559
◽
Cited By ~ 14
Author(s):
V. Ram Prabha
◽
P. Latha
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Malicious Node
◽
Malicious Node Detection
◽
Fuzzy Trust
Download Full-text
Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
Wireless Personal Communications
◽
10.1007/s11277-020-07291-5
◽
2020
◽
Vol 113
(4)
◽
pp. 1775-1790
Author(s):
S. Gomathi
◽
C. Gopala Krishnan
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Aggregation
◽
Wireless Sensor
◽
Malicious Node
◽
Secure Data
◽
Malicious Node Detection
◽
Secure Data Aggregation
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close