Academic literature on the topic 'ACTIVE attacks in MANET'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ACTIVE attacks in MANET.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ACTIVE attacks in MANET"

1

Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.

Full text
Abstract:
Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, we focus on Black Hole attack in Mobile adhoc networks. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing att
APA, Harvard, Vancouver, ISO, and other styles
2

Hikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.

Full text
Abstract:
Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in M
APA, Harvard, Vancouver, ISO, and other styles
3

Harpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.

Full text
Abstract:
In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to han
APA, Harvard, Vancouver, ISO, and other styles
4

Ramachandran, Dhanagopal, Sasikumar S, Vallabhuni Rajeev Ratna, et al. "A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)." Security and Communication Networks 2022 (August 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/8067447.

Full text
Abstract:
Security in MANETs is a highly contentious topic in the field of network management. The availability and functionality of a MANET might be compromised by a variety of attacks. One of the most prevalent active attacks used to degrade network speed and reliability is the black hole attack, which leads the compromised agent to discard all data packets. The purpose of a black hole node is to trick other access points into thinking that they must use their node as their route to a certain destination. The black hole node in a cable network cannot be detected or eliminated in an AODV network. We im
APA, Harvard, Vancouver, ISO, and other styles
5

Zalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.

Full text
Abstract:
This paper discusses an improved mechanism to mitigate the DDoS attack in Mobile Ad-hoc Network (MANET) without compromising the packet delivery ratio. MANET inherently has geographically sparse mobile nodes more vulnerable to various attackers more radically the DDoS type. Moreover it emanates open medium, absence of centralized authority, lack of clear line of defense that leads to more vulnerability towards secure environment. Since there are no hindrances for non-legitimate nodes, which allows them to freely enter and exit from the network at anytime, various active attacks like black hole
APA, Harvard, Vancouver, ISO, and other styles
6

Balla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.

Full text
Abstract:
MANET is one of self configuring fastest emerging wireless technology. MANET is multi-hop wireless network of autonomous mobile nodes with no preset infrastructure where each node can move in any direction as well play a role of router. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among pair of nodes. Therefore many proactive, reactive & hybrid routing protocols have been proposed, among which one of well known is AODV due to its high performance gain. Cooperative nature of nodes exposes MANET to various kinds of passive &amp
APA, Harvard, Vancouver, ISO, and other styles
7

Begum, Shifana. "An Efficient & Secure Timer Based baiting Approach to Detect Black Hole Attacks in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (2020): 29–32. http://dx.doi.org/10.46501/ijmtst060607.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is a type of wireless networks that provides numerous applications in different areas. Security of MANET had become one of the hottest topics in networks fields. MANET is vulnerable to different types of attacks that affect its functionality and connectivity. The black-hole attack is considered one of the mostwide spread active attacks that degrade the performance and reliability of the network as a result of dropping all incoming packets by the malicious node. Black-hole node aims to fool every node in the network that wants to communicate with another node by pr
APA, Harvard, Vancouver, ISO, and other styles
8

Patial, Atul. "Security Techniques in MANET: A Study." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1524–28. http://dx.doi.org/10.22214/ijraset.2021.39567.

Full text
Abstract:
Abstract: MANET (mobile ad hoc network) is considered to be a network with no centralized control. This network typically faces two major challenges related to routing and security. Both these issues affect the performance of this network to a large extent. The black hole attack belongs to the category of active attacks that are launched to reduce the network throughput and other parameters. The research works carried out in the past used different techniques to isolate malicious nodes, but with the inclusion of extra hardware and software tools. The various techniques for the security in MANE
APA, Harvard, Vancouver, ISO, and other styles
9

Sharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of the high demand in sharing streaming video and audio in various applications .Once MANET is setup it quickly facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that have
APA, Harvard, Vancouver, ISO, and other styles
10

Rao, Tandu Rama, and P. V. Nageswara Rao. "Innovative Technique to Detect and Prevent Malicious Nodes in AOMDV against Blackhole Attacks in MANET for Increase the Network Efficiency." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 9 (2022): 86–94. http://dx.doi.org/10.17762/ijritcc.v10i9.5708.

Full text
Abstract:
The Ad hoc on-demand multipath distance vector (AOMDV) routing protocol is one type of reactive routing protocol used in MANET. It is designed on top of the AODV routing protocol, so it utilizes the features of the AODV protocol. The MANET is a wireless ad hoc network without any physical infrastructure; all nodes can be moved across the network, and connections are made between them as needed simply with the help of RREQ, RREP, and RERR packets. Because the network is dynamic, nodes can quickly join and depart anytime. So far, no security threats have been caused by this feature. The blackhol
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "ACTIVE attacks in MANET"

1

Markettos, Athanasios Theodore. "Active electromagnetic attacks on secure hardware." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of high demand in sharing streaming video and audio in various applications, one MANET could be setup quickly to facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that hav
APA, Harvard, Vancouver, ISO, and other styles
3

Alam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.

Full text
Abstract:
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, disruption of the medium access control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks o
APA, Harvard, Vancouver, ISO, and other styles
4

Schellenberg, Falk [Verfasser], Christof [Gutachter] Paar, and Daniel [Gutachter] Holcomb. "Novel methods of passive and active side-channel attacks / Falk Schellenberg ; Gutachter: Christof Paar, Daniel Holcomb ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1175204986/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

R, V. Saraswathy. "Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1521192556946491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Silva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.

Full text
Abstract:
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento
APA, Harvard, Vancouver, ISO, and other styles
7

Cioranesco, Jean-Michel. "Nouvelles Contre-Mesures pour la Protection de Circuits Intégrés." Thesis, Paris 1, 2014. http://www.theses.fr/2014PA010022/document.

Full text
Abstract:
Les domaines d'application de la cryptographie embarquée sont très divers et se retrouvent au croisement de toutes les applications personnelles, avec un besoin évident de confidentialité des données et également de sécurité d'accès des moyens de paiement. Les attaques matérielles invasives ont fait de tous temps partie de l'environnement industriel. L'objectif de cette thèse est de proposer de nouvelles solutions pour protéger les circuits intégrés contre ces attaques physiques. La première partie décrit les notions d'attaques par canaux cachés, d'attaques invasives et de retro-conception. Pl
APA, Harvard, Vancouver, ISO, and other styles
8

Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Full text
Abstract:
The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. Existing misuse and anomaly-based detection and prevention techniques fail to cope with the volume and sophistication of new attacks that are continuously appearing, which suggests that there is a need t
APA, Harvard, Vancouver, ISO, and other styles
9

Trabé, Patrick. "Infrastructure réseau coopérative et flexible de défense contre les attaques de déni de service distribué." Toulouse 3, 2006. http://www.theses.fr/2006TOU30288.

Full text
Abstract:
Les attaques par déni de service distribué (DDoS, Distributed Denial of Service) consistent à limiter ou à empêcher l'accès à un service informatique. La disponibilité du service proposé par la victime est altérée soit par la consommation de la bande passante disponible sur son lien, soit à l'aide d'un nombre très important de requêtes dont le traitement surconsomme les ressources dont elle dispose. Le filtrage des DDoS constitue aujourd'hui encore un problème majeur pour les opérateurs. Le trafic illégitime ne comporte en effet que peu ou pas de différences par rapport au trafic légitime. Ces
APA, Harvard, Vancouver, ISO, and other styles
10

Alkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.

Full text
Abstract:
Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under “normal” system state conditions and can consequently help identify security breaches not addressed by current standards. This study of RFID traffic characterization considers two piecewise-constant data smoothing
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "ACTIVE attacks in MANET"

1

1946-, Bush George W., United States. Congress. House. Committee on International Relations, and United States. Congress. House. Committee on Armed Services, eds. Declaration of national emergency by reason of certain terrorist attacks: Message from the President of the United States transmitting his declaration of a national emergency by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States and his executive order to order the ready reserve of the Armed forces to active duty and delegating certain authorities to the secretaries of defense and transportation, pursuant to 50 U.S.C. 1621(a). U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Burrese, Alain. Survive A Shooting: Strategies to Survive Active Shooters and Terrorist Attacks. TGW Books, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Department of Defense. Armed Deterrence: Countering Soft Target Attacks - Open Carry Firearms Policy for ROTC Detachments for Protection from Mass Shootings, Active Shooters and Self-Radicalized Lone-Wolf Terrorist Attacks. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Warren, Mark, and Vaughn Baker. Active Threat : Workplace 911: An Expert Guide to Preventing, Preparing for and Prevailing over Attacks at Work, School and Church. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "ACTIVE attacks in MANET"

1

Eid, Marwa M., and Noha A. Hikal. "Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58669-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schnoor, Henning, and Oliver Woizekowski. "Active Linking Attacks." In Mathematical Foundations of Computer Science 2015. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48054-0_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. "Counteracting Active Attacks." In Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

De Ciercq, Jan. "Deflecting Active Directory Attacks." In ISSE 2006 — Securing Electronic Busines Processes. Vieweg, 2006. http://dx.doi.org/10.1007/978-3-8348-9195-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Simpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ayala, Luis. "Active Medical Device Cyber-Attacks." In Cybersecurity for Hospitals and Healthcare Facilities. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2155-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Eric Y. "AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks." In Active Networks. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45451-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Enneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ACTIVE attacks in MANET"

1

Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeter, Tre' R., Truc Nguyen, Raed Alharbi, and My T. Thai. "OASIS: Offsetting Active Reconstruction Attacks in Federated Learning." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tan, En Jie, Kowit Tan, Royce Yu Feng Chong, et al. "Simulation of Pre-Ransomware Attacks on Active Directory." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

A, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dora, Jean Rosemond, and Ladislav Hluchy. "Attacks on Active Directory - Kerberos Delegation: *Exploitation of Active Directory using Kerberos Constrained Delegation." In 2024 IEEE 6th International Symposium on Logistics and Industrial Informatics (LINDI). IEEE, 2024. https://doi.org/10.1109/lindi63813.2024.10820404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Noureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Patel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "ACTIVE attacks in MANET"

1

Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies, 2022. http://dx.doi.org/10.55271/5jchdy.

Full text
Abstract:
Turkey, Pakistan, India, Malaysia, and Indonesia span one of the longest continuously inhabited regions of the world. Centuries of cultural infusion have ensured these societies are highly heterogeneous. As plural polities, they are ripe for the kind of freedoms that liberal democracy can guarantee. However, despite having multi-party electoral systems, these countries have recently moved toward populist authoritarianism. Populism —once considered a distinctively Latin American problem that only seldom reared its head in other parts of the world— has now found a home in almost every corner of
APA, Harvard, Vancouver, ISO, and other styles
2

Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/rp0001.

Full text
Abstract:
Turkey, Pakistan, India, Malaysia, and Indonesia span one of the longest continuously inhabited regions of the world. Centuries of cultural infusion have ensured these societies are highly heterogeneous. As plural polities, they are ripe for the kind of freedoms that liberal democracy can guarantee. However, despite having multi-party electoral systems, these countries have recently moved toward populist authoritarianism. Populism —once considered a distinctively Latin American problem that only seldom reared its head in other parts of the world— has now found a home in almost every corner of
APA, Harvard, Vancouver, ISO, and other styles
3

Monthly Infographics Report: March 2024. Microgovernance Research Initiative (MGR), 2024. http://dx.doi.org/10.57189/mgrinfmar24.

Full text
Abstract:
MGR recorded 1503 violent incidents during March 2024, mostly triggered by politics, access to resources, and other socio-economic factors. More than 242 deaths and 2698 injuries have been recorded from these incidents. The highest number of violent incidents have been recorded in the form of clashes and attacks (426). Some 153 incidents are directly political violence, protests and arrests which resulted in 16 deaths. Geographically, Chittagong (351) scores the highest number of violence followed by Dhaka (306), Rajshahi (244) and Barishal (213). There were 86 protests and demonstrations and
APA, Harvard, Vancouver, ISO, and other styles
4

MGR Quarterly Infographics Report: April – June, 2024. Microgovernance Research Initiative (MGR), 2024. http://dx.doi.org/10.57189/mgrinfq6aj24.

Full text
Abstract:
MGR recorded 3827 violent incidents during April to June 2024, mostly triggered by politics, access to resources, and other socio-economic factors. More than 770 deaths and 4356 injuries have been recorded from these incidents. The highest number of violent incidents have been recorded in the form of clashes and attacks (1318). Some 746 incidents are directly political violence, protests and arrests which resulted in 92 deaths. Geographically, Dhaka (895) scores the highest number of violence followed by Chittagong (890), Rajshahi (650) and Barishal (484). There were 199 protests and demonstra
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!