Academic literature on the topic 'Grey Hole Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Grey Hole Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Grey Hole Attack"
Kaur, Rupinder, and Parminder Singh. "Review of Black Hole and Grey Hole Attack." International journal of Multimedia & Its Applications 6, no. 6 (2014): 35–45. http://dx.doi.org/10.5121/ijma.2014.6603.
Full textK., T. Gowdhami, and Nithya D. "DESIGN AND ANALYSIS OF SECURE VANET FRAMEWORK PREVENTING SINK HOLE AND GRAY HOLE ATTACK." International Journal of Advanced Trends in Engineering and Technology 2, no. 1 (2017): 55–59. https://doi.org/10.5281/zenodo.495747.
Full textC, Gowdham, and Dr Parvatham Vijay N. "Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (2020): 104–15. http://dx.doi.org/10.5373/jardcs/v12i8/20202452.
Full textDr., Srinivas Ambala* Dr. Ravi Kumar Yeatha. "ANALYSIS AND REVIEW ON VARIOUS SECURITY ISSUES AND THEIR PREVENTION TECHNIQUES IN THE AD-HOC SENSOR NETWORKS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 2 (2017): 309–14. https://doi.org/10.5281/zenodo.290263.
Full textJasvir, Markandy1 Manmohan Sharma2. "DIMINISH THE FLOODING ATTACK USING MUTUAL AUTHENTICATION IN MOBILE AD-HOC NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 5 (2018): 24–30. https://doi.org/10.5281/zenodo.1241365.
Full textJ, Viji Gripsy, Jayanthiladevi A, Mahendiran N, and Sheela Rini A. "SRDAODV: A Hybrid Secure Routing Protocol for Mobile Ad-Hoc Networks." Indian Journal of Science and Technology 16, no. 32 (2023): 2574–79. https://doi.org/10.17485/IJST/v16i32.1240.
Full textK., Thamizhmaran. "Effective Communication in Infrastructure less Wireless Network using PQ Scheduling Algorithm." Journal of Optoelectronics and Communication 5, no. 3 (2023): 33–39. https://doi.org/10.5281/zenodo.10088679.
Full textGeete, Kanu, Piyush Kumar Shukla, and Anjana Jayant Deen. "A Survey on Grey Hole Attack in Wireless mesh Networks." International Journal of Computer Applications 95, no. 23 (2014): 23–29. http://dx.doi.org/10.5120/16736-7019.
Full textShiranzaei, Atena, and Farhad Khoshbakht. "A Novel Detection Method for Grey Hole Attack in RPL." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (2023): 492–97. http://dx.doi.org/10.17762/ijritcc.v11i7s.7027.
Full textK., Thamizhmaran. "SCHEDULING ALGORITHM IN INFRASTRUCTURELESS NETWORK." Journal of Emerging Trends in Electrical Engineering 5, no. 3 (2023): 16–19. https://doi.org/10.5281/zenodo.10147509.
Full textDissertations / Theses on the topic "Grey Hole Attack"
Hsieh, Yi-Ting, and 謝易廷. "Detection of Gray Hole attack in Software Define Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/868sjw.
Full textBooks on the topic "Grey Hole Attack"
Kennedy, Thomas C. Quakers. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199683710.003.0004.
Full textBook chapters on the topic "Grey Hole Attack"
Musale, Sandeep S., Sandeep L. Dhende, S. D. Shirbahadurkar, and Anand S. Najan. "Gray Hole and Cooperative Attack Prevention Protocol for MANETs." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1501-5_49.
Full textLiu, Dezhi, and Zhen Guo. "A Lightweight Detection Scheme for the Black-Hole Attacks and Gray-Hole Attacks in VANETs." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-1548-3_16.
Full textGeetanjali Rathee and Hemraj Saini. "Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network." In Proceedings of the International Congress on Information and Communication Technology. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0755-2_41.
Full textRao, Sunil Poyyagadde, Deepak Devaru Joshi, and Juzi Zhao. "Machine Learning Based Detection of Gray-Hole Attack in Mobile Ad-Hoc Networks." In 3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44372-6_13.
Full textChawla, Priya, and Monika Sachdeva. "Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6005-2_41.
Full textDoshi, Chintan Ketankumar, Sreecharan Sankaranarayanan, Vidyashankar B. Lakshman, and K. Chandrasekaran. "Game Theoretic Modeling of Gray Hole Attacks in Wireless Ad Hoc Networks." In Lecture Notes in Electrical Engineering. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-3592-7_21.
Full textDeepali Virmani and Pranav Gupta. "Adaptive Exponential Trust-Based Algorithm in Wireless Sensor Network to Detect Black Hole and Gray Hole Attacks." In Emerging Research in Computing, Information, Communication and Applications. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0287-8_6.
Full textNeha, Gurjot Kaur Walia, and Harminder Kaur. "A Cipher Based Acknowledgement Approach for Securing MANETs by Mitigating Black and Gray Hole Attacks." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0755-3_16.
Full textKurtkoti, Mahesh, B. S. Premananda, and K. Vishwavardhan Reddy. "Performance Analysis of Machine Learning Algorithms in Detecting and Mitigating Black and Gray Hole Attacks." In Innovative Data Communication Technologies and Application. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7167-8_69.
Full textSelvik, Kjetil, and Jacob Høigilt. "National Security and Free Speech in Tunisia." In Journalism in the Grey Zone. Edinburgh University Press, 2023. http://dx.doi.org/10.3366/edinburgh/9781399515818.003.0006.
Full textConference papers on the topic "Grey Hole Attack"
Mohapata, Soumya Ranjan, Rekha Jain, Srinivas Koushik K, Sandeep Varma Kalidindi, and Umashankar Ghugar. "TBNDG: Trust-Based Malicious Node Detection for Grey-Hole Attacks in VANET’s." In 2024 Eighth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2024. https://doi.org/10.1109/pdgc64653.2024.10984014.
Full textVimalnath, S., R. Midhun, A. S. Kavinesh, P. Karvendan, and K. Kishore. "Enhanced Security Framework for Gray-Hole Attack Prevention in Vehicular Networks." In 2025 International Conference on Visual Analytics and Data Visualization (ICVADV). IEEE, 2025. https://doi.org/10.1109/icvadv63329.2025.10961129.
Full textM, Arunkumar, Janaranjani M, and Pavithra K. "A Proactive Approach for Securing VANETs Against Gray-Hole Attacks." In 2025 3rd International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC). IEEE, 2025. https://doi.org/10.1109/isacc65211.2025.10969306.
Full textNagalakshmi, T. J., and R. Samar Kumar. "Comparative Analysis of Random Forest and Decision Tree for Gray Hole Attack Detection in Wireless Ad Hoc Networks." In 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE). IEEE, 2024. http://dx.doi.org/10.1109/icspcre62303.2024.10675140.
Full textKanaparthi, Venkata Murali Mohan, and Krishna Vempati. "Grey hole attack in mobile ad-hoc network mitigation and protection." In WOMEN IN PHYSICS: 7th IUPAP International Conference on Women in Physics. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0181902.
Full textKumar, R. Samar, and T. J. Nagalakshmi. "Design of intrusion detection system in the detection of grey hole attack in wireless ad hoc network using K-means cluster comparing with decision tree." In FIFTH INTERNATIONAL CONFERENCE ON APPLIED SCIENCES: ICAS2023. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0197407.
Full textPatil, Sarika U. "Gray hole attack detection in MANETs." In 2017 2nd International Conference for Convergence in Technology (I2CT). IEEE, 2017. http://dx.doi.org/10.1109/i2ct.2017.8226087.
Full textVerma, Swati, Bhawna Mallick, and Poonam Verma. "Impact of gray hole attack in VANET." In 2015 1st International Conference on Next Generation Computing Technologies (NGCT). IEEE, 2015. http://dx.doi.org/10.1109/ngct.2015.7375097.
Full textChadha, Kriti, and Sushma Jain. "Impact of black hole and gray hole attack in AODV protocol." In 2014 Recent Advances and Innovations in Engineering (ICRAIE). IEEE, 2014. http://dx.doi.org/10.1109/icraie.2014.6909188.
Full textDhende, Sandeep, Sandeep Musale, Suresh Shirbahadurkar, and Anand Najan. "SAODV: Black hole and gray hole attack detection protocol in MANETs." In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017. http://dx.doi.org/10.1109/wispnet.2017.8300188.
Full text