Security attacks in opportunistic mobile networks: A systematic literature review

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2024 - Elsevier
Abstract Opportunistic Mobile Networks (OMNs), also known as Delay Tolerant Networks
(DTNs), refer to wireless networks in which the mobile nodes (eg, smartphones, tablets …

[PDF][PDF] INTELLIGENT SYSTEM FOR DETECTION OF COPYRIGHT-PROTECTED DATA FOR ENHANCED DATA SECURITY

N Udoetor, G Ansa, A Ekong, A Edet - Technology, 2024 - researchgate.net
In the digital era, the proliferation of digital content has intensified concerns over intellectual
property rights infringement, highlighting the need for robust copyright protection solutions …

Analyzing and designing energy efficient routing protocol in delay tolerant networks

N Choudhary, K Mittal, KD Kota, P Nagrath… - CSI transactions on …, 2016 - Springer
Abstract Delay tolerant networks (Barun Saha, http://delay-tolerant-networks. blogspot. in)
are the networks that address the technical issues in heterogeneous network that may lack …

[PDF][PDF] Reputation Based Security Scheme In Dtn

A Rajaram - ijaist.com
Disruption Tolerant Networks (DTN) differ from traditional network paradigms because of
their inconsistent connectivity between nodes. Mobile nodes are often affected by malicious …

[PDF][PDF] Naive Bayesian Model for Detecting Malware in Tolerant Networks

M NAGARAJU, C YOSEPU - 2015 - ijsetr.com
With the universal presence of short-range property technologies (eg, Bluetooth and,
additional recently, Wi-Fi Direct) within the client natural philosophy market, the delay …

[PDF][PDF] A Cognitive Packet Protocol for Opportunistic Communications

EV Liotou - 2012 - eliotou.dit.people.hua.gr
Opportunistic Networking is a very challenging and promising paradigm for mobile
communications. In contrast to any other network type, opportunistic networks do not rely on …