STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY
Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore imparting high level security mechanism is highly indispensable for such advanced technical systems. Game Theory acts as a suitable tool offering promising solutions to securityrelated concerns in Mob...
| Main Authors: | Olanrewaju, Rashidah Funke, Najeeb, Athaur Rahman |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/68267/ http://irep.iium.edu.my/68267/1/RIGS%20%20Report.pdf |
Similar Items
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
by: Islam, Thouhedul, et al.
Published: (2017)
by: Islam, Thouhedul, et al.
Published: (2017)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
MANET – A cogitation of its design and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)
by: Khan , Burhan ul Islam, et al.
Published: (2014)
MR image reconstruction with autoregressive moving average
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2007)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2007)
Optimal model order selection for transient error autoregressive moving average (TERA) MRI reconstruction method
by: Najeeb, Athaur Rahman, et al.
Published: (2008)
by: Najeeb, Athaur Rahman, et al.
Published: (2008)
A novel clustering based genetic algorithm for route optimization
by: Aibinu, Abiodun Musa, et al.
Published: (2016)
by: Aibinu, Abiodun Musa, et al.
Published: (2016)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Gateway sink placement for sensor node grid distribution in LoRa smart city networks
by: Zainal, Nur Aishah, et al.
Published: (2018)
by: Zainal, Nur Aishah, et al.
Published: (2018)
Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Performance analysis of clustering based genetic
algorithm
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
Trust and resource oriented communication scheme in mobile ad hoc networks
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
A novel neuroscience-inspired architecture: for computer vision applications
by: Hassan, Marwa Yousif, et al.
Published: (2016)
by: Hassan, Marwa Yousif, et al.
Published: (2016)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Modelling of intelligent intrusion detection system: making a case for snort
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Strategic profiling for behaviour visualization of malicious node in MANETs using game theory
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
A Review on energy consumption optimization techniques in IoT based smart building environments
by: Shah, Abdul Salam, et al.
Published: (2019)
by: Shah, Abdul Salam, et al.
Published: (2019)
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Prioritizing barriers of e-learning for effective teaching-learning using Fuzzy Analytic Hierarchy Process (FAHP)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2018)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2018)
Parameters used in gateway selection schemes for Internet connected MANETs: a review
by: Mahmood, Zainab S., et al.
Published: (2015)
by: Mahmood, Zainab S., et al.
Published: (2015)
Development of an intelligent and remote IoT-based monitoring system for power quality application
by: Mohd Noh, Faridah Hanim, et al.
Published: (2020)
by: Mohd Noh, Faridah Hanim, et al.
Published: (2020)
Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Disparity between theory & practice beyond the worst-case competitive analysis
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
CMAC for speech emotion profiling
by: Kamaruddin, Norhaslinda, et al.
Published: (2009)
by: Kamaruddin, Norhaslinda, et al.
Published: (2009)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
Measuring usability of electronic Quran mobile application in pervasive computing environments: user profiling
by: Abd Ghani, Nur Nina Syazwani, et al.
Published: (2017)
by: Abd Ghani, Nur Nina Syazwani, et al.
Published: (2017)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Similar Items
-
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019) -
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015) -
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014) -
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020) -
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)