These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

125 related articles for article (PubMed ID: 22247657)

  • 1. A New MANET wormhole detection algorithm based on traversal time and hop count analysis.
    Karlsson J; Dooley LS; Pulkkis G
    Sensors (Basel); 2011; 11(12):11122-40. PubMed ID: 22247657
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm.
    Karlsson J; Dooley LS; Pulkkis G
    Sensors (Basel); 2013 May; 13(5):6651-68. PubMed ID: 23686143
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET.
    Jen SM; Laih CS; Kuo WC
    Sensors (Basel); 2009; 9(6):5022-39. PubMed ID: 22408566
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions.
    Bhatti DS; Saleem S; Imran A; Kim HJ; Kim KI; Lee KC
    Sci Rep; 2024 Feb; 14(1):3428. PubMed ID: 38341499
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Geographic wormhole detection in wireless sensor networks.
    Sookhak M; Akhundzada A; Sookhak A; Eslaminejad M; Gani A; Khurram Khan M; Li X; Wang X
    PLoS One; 2015; 10(1):e0115324. PubMed ID: 25602616
    [TBL] [Abstract][Full Text] [Related]  

  • 6. DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output.
    Pramitarini Y; Perdana RHY; Shim K; An B
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37766016
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Introducing a new routing method in the MANET using the symbionts search algorithm.
    Tabatabaei S
    PLoS One; 2023; 18(8):e0290091. PubMed ID: 37624812
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET.
    Shukla M; Joshi BK; Singh U
    Wirel Pers Commun; 2021; 121(1):503-526. PubMed ID: 34219973
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks.
    Rani P; Kavita ; Verma S; Kaur N; Wozniak M; Shafi J; Ijaz MF
    Sensors (Basel); 2021 Dec; 22(1):. PubMed ID: 35274628
    [TBL] [Abstract][Full Text] [Related]  

  • 10. T2AR: trust-aware ad-hoc routing protocol for MANET.
    Dhananjayan G; Subbiah J
    Springerplus; 2016; 5(1):995. PubMed ID: 27441127
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.
    Abdelhaq M; Alsaqour R; Abdelhaq S
    PLoS One; 2015; 10(5):e0120715. PubMed ID: 25946001
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Adaptive MANET multipath routing algorithm based on the simulated annealing approach.
    Kim S
    ScientificWorldJournal; 2014; 2014():872526. PubMed ID: 25032241
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Highly Reliable Fuzzy-Logic-Assisted AODV Routing Algorithm for Mobile Ad Hoc Networks.
    Li J; Wang M; Zhu P; Wang D; You X
    Sensors (Basel); 2021 Sep; 21(17):. PubMed ID: 34502856
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Networked control system with MANET communication and AODV routing.
    Bhatia A; Kumar A; Jain A; Kumar A; Verma C; Illes Z; Aschilean I; Raboaca MS
    Heliyon; 2022 Nov; 8(11):e11678. PubMed ID: 36439715
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A wormhole attack detection method for tactical wireless sensor networks.
    Zhang K
    PeerJ Comput Sci; 2023; 9():e1449. PubMed ID: 37705659
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks.
    Wang P; Zhou M; Ding Z
    Sensors (Basel); 2021 Mar; 21(7):. PubMed ID: 33800676
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.
    Babu MR; Dian SM; Chelladurai S; Palaniappan M
    ScientificWorldJournal; 2015; 2015():715820. PubMed ID: 26495430
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc Networks.
    Lwin MT; Yim J; Ko YB
    Sensors (Basel); 2020 Jan; 20(3):. PubMed ID: 32012774
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Forest Fire Detection Using New Routing Protocol.
    Al-Dhief FT; Muniyandi RC; Sabri N; Hamdan M; Latiff NMA; Albadr MAA; Khairi MHH; Hamzah M; Khan S
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298096
    [TBL] [Abstract][Full Text] [Related]  

  • 20. India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach.
    Kavitha T; Geetha K; Muthaiah R
    J Med Syst; 2019 May; 43(6):179. PubMed ID: 31076950
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.