Thread / Post | Tags | ||
Title: ns2 code for sybil attack on wireless sensor networks Page Link: ns2 code for sybil attack on wireless sensor networks - Posted By: bala Created at: Thursday 17th of August 2017 06:58:47 AM | |||
Wireless sensor networks (WSN), sometimes called wireless sensor and actuator networks (WSAN), are spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many ....etc | |||
| |||
Title: footprint detecting sybil attacks in urban vehicular networks ppt Page Link: footprint detecting sybil attacks in urban vehicular networks ppt - Posted By: mahmoodv99 Created at: Friday 06th of October 2017 02:57:43 PM | |||
| |||
| |||
Title: Searching for Anti Social Elements in Social Networks Page Link: Searching for Anti Social Elements in Social Networks - Posted By: prashant078 Created at: Thursday 17th of August 2017 06:20:36 AM | |||
this project is for designing a Searching for Anti Social Elements in Social Network tool , Today social networking sites allow us to keep in touch with friends and also allow us to make new friends. But not everyone in the networking site is a good (their activities are anti social). Social networks have often been used for not so good activities like hiring recruits for anti social activities, luring of underage children, etc. In this project we will analyze social network graphs to identify anti social elements. This project may be especi ....etc | |||
Title: sybilguard defending against sybil attacks via social networks video Page Link: sybilguard defending against sybil attacks via social networks video - Posted By: maheshgc Created at: Friday 06th of October 2017 03:05:35 PM | |||
To get full information or details of sybilguard defending against sybil attacks via social networks please have a look on the pages | |||
Title: Social Cloud Cloud Computing in Social Networks Page Link: Social Cloud Cloud Computing in Social Networks - Posted By: luv2satya Created at: Thursday 05th of October 2017 04:55:43 AM | |||
to get information about the topic Cloud Computing full report ,ppt and related topic refer the page link bellow | |||
Title: self defending networks Page Link: self defending networks - Posted By: bibhu duttadas Created at: Thursday 17th of August 2017 06:14:50 AM | |||
to get information about topic self defending networks full report ppt and related topic refer the page link bellow | |||
Title: DEFENDING AGAINST SYBIL ATTACKS USING SYBILLIMIT PROTOCOL Page Link: DEFENDING AGAINST SYBIL ATTACKS USING SYBILLIMIT PROTOCOL - Posted By: bitatr Created at: Thursday 05th of October 2017 05:29:55 AM | |||
Submitted by | |||
Title: defending against sensor sniffing attacks on mobile phones ppt Page Link: defending against sensor sniffing attacks on mobile phones ppt - Posted By: arunrajana Created at: Thursday 17th of August 2017 06:50:34 AM | |||
| |||
Title: Novel Defense Mechanism Against Data Flooding Attacks In Wireless Ad Hoc Networks Page Link: Novel Defense Mechanism Against Data Flooding Attacks In Wireless Ad Hoc Networks - Posted By: cjojucool Created at: Friday 06th of October 2017 02:45:00 PM | |||
Novel Defense Mechanism Against Data Flooding Attacks In Wireless Ad Hoc Networks | |||
Title: Exploring the design space of social network-based Sybil defenses Page Link: Exploring the design space of social network-based Sybil defenses - Posted By: pravy.mdu Created at: Thursday 17th of August 2017 05:35:23 AM | |||
Recently, there has been a significant interest in research to leverage social networks to defend against Sybil attacks. While much of this work may seem similar at first glance, Sybil's existing social defence schemes can be divided into two categories: Sybil's detection and Sybil's tolerance. These two categories of systems take advantage of the overall properties of the underlying social graph, but are based on different assumptions and offer different assurances: Sybil's detection schemes are independent of the application and are based onl ....etc |
Please report us any abuse/complaint to "omegawebs @ gmail.com" |