Securing jammed network using reliability behavior value through neuro-fuzzy analysis
DOI10.1007/S12046-015-0377-3zbMATH Open1331.94098OpenAlexW779509771MaRDI QIDQ5963532FDOQ5963532
Authors: S. Raja Ratna, Ragoju Ravi
Publication date: 22 February 2016
Published in: Sādhanā (Search for Journal in Brave)
Full work available at URL: https://www.ias.ac.in/describe/article/sadh/040/04/1139-1153
Recommendations
- A jamming-resistant MAC protocol for multi-hop wireless networks
- Competitive throughput in multi-hop wireless networks despite adaptive jamming
- Deceptive routing in relay networks
- Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
- The wireless network jamming problem subject to protocol interference
Circuits, networks (94C99) Fuzzy sets and logic (in connection with information, communication, or circuits theory) (94D05) Communication networks in operations research (90B18) Fuzzy and other nonstochastic uncertainty mathematical programming (90C70)
Cites Work
Cited In (2)
This page was built for publication: Securing jammed network using reliability behavior value through neuro-fuzzy analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5963532)