Academic literature on the topic 'ACTIVE attacks in MANET'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ACTIVE attacks in MANET.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ACTIVE attacks in MANET"
Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.
Full textHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Full textHarpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.
Full textRamachandran, Dhanagopal, Sasikumar S, Vallabhuni Rajeev Ratna, et al. "A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)." Security and Communication Networks 2022 (August 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/8067447.
Full textZalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.
Full textBalla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.
Full textBegum, Shifana. "An Efficient & Secure Timer Based baiting Approach to Detect Black Hole Attacks in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (2020): 29–32. http://dx.doi.org/10.46501/ijmtst060607.
Full textPatial, Atul. "Security Techniques in MANET: A Study." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1524–28. http://dx.doi.org/10.22214/ijraset.2021.39567.
Full textSharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.
Full textRao, Tandu Rama, and P. V. Nageswara Rao. "Innovative Technique to Detect and Prevent Malicious Nodes in AOMDV against Blackhole Attacks in MANET for Increase the Network Efficiency." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 9 (2022): 86–94. http://dx.doi.org/10.17762/ijritcc.v10i9.5708.
Full textDissertations / Theses on the topic "ACTIVE attacks in MANET"
Markettos, Athanasios Theodore. "Active electromagnetic attacks on secure hardware." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609203.
Full textVu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.
Full textAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Full textSchellenberg, Falk [Verfasser], Christof [Gutachter] Paar, and Daniel [Gutachter] Holcomb. "Novel methods of passive and active side-channel attacks / Falk Schellenberg ; Gutachter: Christof Paar, Daniel Holcomb ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1175204986/34.
Full textR, V. Saraswathy. "Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1521192556946491.
Full textSilva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.
Full textCioranesco, Jean-Michel. "Nouvelles Contre-Mesures pour la Protection de Circuits Intégrés." Thesis, Paris 1, 2014. http://www.theses.fr/2014PA010022/document.
Full textIzagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.
Full textTrabé, Patrick. "Infrastructure réseau coopérative et flexible de défense contre les attaques de déni de service distribué." Toulouse 3, 2006. http://www.theses.fr/2006TOU30288.
Full textAlkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.
Full textBooks on the topic "ACTIVE attacks in MANET"
1946-, Bush George W., United States. Congress. House. Committee on International Relations, and United States. Congress. House. Committee on Armed Services, eds. Declaration of national emergency by reason of certain terrorist attacks: Message from the President of the United States transmitting his declaration of a national emergency by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States and his executive order to order the ready reserve of the Armed forces to active duty and delegating certain authorities to the secretaries of defense and transportation, pursuant to 50 U.S.C. 1621(a). U.S. G.P.O., 2001.
Find full textActive Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Find full textHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Find full textHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Find full textHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Find full textHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Find full textHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Find full textBurrese, Alain. Survive A Shooting: Strategies to Survive Active Shooters and Terrorist Attacks. TGW Books, 2018.
Find full textDepartment of Defense. Armed Deterrence: Countering Soft Target Attacks - Open Carry Firearms Policy for ROTC Detachments for Protection from Mass Shootings, Active Shooters and Self-Radicalized Lone-Wolf Terrorist Attacks. Independently Published, 2019.
Find full textWarren, Mark, and Vaughn Baker. Active Threat : Workplace 911: An Expert Guide to Preventing, Preparing for and Prevailing over Attacks at Work, School and Church. Independently Published, 2018.
Find full textBook chapters on the topic "ACTIVE attacks in MANET"
Eid, Marwa M., and Noha A. Hikal. "Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58669-0_23.
Full textSchnoor, Henning, and Oliver Woizekowski. "Active Linking Attacks." In Mathematical Foundations of Computer Science 2015. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48054-0_46.
Full textGuha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. "Counteracting Active Attacks." In Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0_6.
Full textJha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.
Full textDe Ciercq, Jan. "Deflecting Active Directory Attacks." In ISSE 2006 — Securing Electronic Busines Processes. Vieweg, 2006. http://dx.doi.org/10.1007/978-3-8348-9195-2_18.
Full textSardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Full textSimpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.
Full textAyala, Luis. "Active Medical Device Cyber-Attacks." In Cybersecurity for Hospitals and Healthcare Facilities. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2155-6_3.
Full textChen, Eric Y. "AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks." In Active Networks. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45451-9_1.
Full textEnneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.
Full textConference papers on the topic "ACTIVE attacks in MANET"
Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.
Full textJeter, Tre' R., Truc Nguyen, Raed Alharbi, and My T. Thai. "OASIS: Offsetting Active Reconstruction Attacks in Federated Learning." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00097.
Full textTan, En Jie, Kowit Tan, Royce Yu Feng Chong, et al. "Simulation of Pre-Ransomware Attacks on Active Directory." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871611.
Full textA, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.
Full textDora, Jean Rosemond, and Ladislav Hluchy. "Attacks on Active Directory - Kerberos Delegation: *Exploitation of Active Directory using Kerberos Constrained Delegation." In 2024 IEEE 6th International Symposium on Logistics and Industrial Informatics (LINDI). IEEE, 2024. https://doi.org/10.1109/lindi63813.2024.10820404.
Full textGupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.
Full textNoureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.
Full textPatel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.
Full textChawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.
Full textSingh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.
Full textReports on the topic "ACTIVE attacks in MANET"
Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies, 2022. http://dx.doi.org/10.55271/5jchdy.
Full textYilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/rp0001.
Full textMonthly Infographics Report: March 2024. Microgovernance Research Initiative (MGR), 2024. http://dx.doi.org/10.57189/mgrinfmar24.
Full textMGR Quarterly Infographics Report: April – June, 2024. Microgovernance Research Initiative (MGR), 2024. http://dx.doi.org/10.57189/mgrinfq6aj24.
Full text