2023
DOI: 10.32604/iasc.2023.028852
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Network Security Using Load Balanced Mobile Sink Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 36 publications
0
1
0
Order By: Relevance
“…They know every detail of the IT infrastructure, as well as the physical and logical aspects, so their input is crucial to identify its most critical components. It is important to get information about the IT department regarding the information assets, cashflow statement, location of the assets, and network architecture access routes, mainly as we aim to get a security model [18] based on a hierarchical identitybased Blockchain System to get better network security [19].…”
Section: Identify Infrastructure Vulnerabilitiesmentioning
confidence: 99%
“…They know every detail of the IT infrastructure, as well as the physical and logical aspects, so their input is crucial to identify its most critical components. It is important to get information about the IT department regarding the information assets, cashflow statement, location of the assets, and network architecture access routes, mainly as we aim to get a security model [18] based on a hierarchical identitybased Blockchain System to get better network security [19].…”
Section: Identify Infrastructure Vulnerabilitiesmentioning
confidence: 99%