Search Results - (( development communication trust algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- development communication »
- communication trust »
- implication force »
- java implication »
- trust algorithm »
- force algorithm »
-
1
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Ascertaining trust of information transmitted during a disaster
Published 2016“…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
Get full text
Get full text
Article -
3
Ascertaining trust of information transmitted during a disaster
Published 2016“…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
Get full text
Get full text
Article -
4
Ascertaining trust of information transmitted during a disaster
Published 2023“…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
Article -
5
-
6
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…The trust is established via Trusted Platform Module (TPM) and group communication. …”
Get full text
Get full text
Thesis -
7
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
9
The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates
Published 2025“…The findings have practical implications for educators, marketers, and platform developers who want to tailor communication strategies to the preferences of young audiences. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
The influence of Robo-advisory services on Malaysia university student’s investment intention
Published 2025“…These results highlight the need for fintech developers and financial service providers to focus on building secure, user-friendly platforms that foster trust and address risk concerns, particularly when targeting young, techsavvy investors. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Efficient node cooperation stimulation mechanism in wireless multihop networks
Published 2017“…The mechanism is called Trust Features-based Evidence (TFE) which is developed based on significant and unique trust features to ensure that the reported information is of actual behaviour of an observed node. …”
Get full text
Get full text
Get full text
Thesis -
12
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Network simulator (NS2) simulation findings demonstrate that the trust based algorithm achieves an average packet delivery ratio (PDR) of 87.3%, end to end delay (EED) of 7.47 ms and black hole detection accuracy of 90%. …”
Get full text
Get full text
Get full text
Thesis -
13
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…Further, the thesis shows how to systematically transform solutions that work in a model of idealized authenticated communications into solutions that are secure in the realistic setting of wired communication channels such as access control, and online transactions involving contact communication schemes. …”
Get full text
Get full text
Thesis -
14
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…The concept of multi-hop vehicle-to-vehicle wireless communications is essential for developing routing protocols. …”
Get full text
Get full text
Thesis
