Journal articles on the topic 'Mobile attacker'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mobile attacker.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Christopher, Mitchel, Ghaleb Baraq, M. Ghaleb Safwan, Jaroucheh Zakwan, and Ali Saleh Al-rimy Bander. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 2 (2020): 66–72. https://doi.org/10.35940/ijeat.B1962.1210220.
Full textWang, Xueou, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, and Martín Ochoa. "Constrained Proximity Attacks on Mobile Targets." ACM Transactions on Privacy and Security 25, no. 2 (2022): 1–29. http://dx.doi.org/10.1145/3498543.
Full textWang, Yaru, Ning Zheng, Ming Xu, et al. "Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App." Sensors 19, no. 14 (2019): 3052. http://dx.doi.org/10.3390/s19143052.
Full textBang, Hyo-Chan, Jin-Oh Him, Jung-Chan Na, Joong-Su Jang, and Young-Suk Lee. "Attacker Response Framework using Mobile Code." KIPS Transactions:PartC 11C, no. 7 (2004): 959–70. http://dx.doi.org/10.3745/kipstc.2004.11c.7.959.
Full textFang, F., A. X. Jiang, and M. Tambe. "Protecting Moving Targets with Multiple Mobile Resources." Journal of Artificial Intelligence Research 48 (November 17, 2013): 583–634. http://dx.doi.org/10.1613/jair.4027.
Full textMitchel, Christopher, Baraq Ghaleb, Safwan M. Ghaleb, Zakwan Jaroucheh, and Bander Ali Saleh Al-rimy. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 66–72. http://dx.doi.org/10.35940/ijeat.b1962.1210220.
Full textMohammadani, Khalid Hussain, Kamran Ali Memon, Imran Memon, Nazish Nawaz Hussaini, and Hadiqua Fazal. "Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks." International Journal of Distributed Sensor Networks 16, no. 5 (2020): 155014772092162. http://dx.doi.org/10.1177/1550147720921624.
Full textMostovoy, R. A., A. B. Levina, D. M. Sleptsova, and P. S. Borisenko. "SIDE-CHANNEL ATTACKS ON THE MOBILE PHONES." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 186 (December 2019): 46–53. http://dx.doi.org/10.14489/vkit.2019.12.pp.046-053.
Full textGara, Fatma, Leila Ben Saad, and Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility." International Journal on Semantic Web and Information Systems 13, no. 3 (2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.
Full textMiao, Li, Shuai Li, Xiangjuan Wu, and Bingjie Liu. "Mean-Field Stackelberg Game-Based Security Defense and Resource Optimization in Edge Computing." Applied Sciences 14, no. 9 (2024): 3538. http://dx.doi.org/10.3390/app14093538.
Full textMitra, Sulata, and Priyodarshini Dhar. "Two Variants of Secure Routing Algorithms in Mobile Ad Hoc Network." International Journal of Sensors, Wireless Communications and Control 9, no. 1 (2019): 80–110. http://dx.doi.org/10.2174/2210327908666180807100746.
Full textEl-Sofany, Hosam, and Samir Abou El-Seoud. "A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 01 (2019): 85. http://dx.doi.org/10.3991/ijim.v13i01.9900.
Full textGhouzali, Sanaa, Maryam Lafkih, Wadood Abdul, Mounia Mikram, Mohammed El Haziti, and Driss Aboutajdine. "Trace Attack against Biometric Mobile Applications." Mobile Information Systems 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/2065948.
Full textJanan Farag Yonan and Nagham Amjed Abdul Zahra. "Node Intrusion Tendency Recognition Using Network Level Features Based Deep Learning Approach." Babylonian Journal of Networking 2023 (January 10, 2023): 1–10. http://dx.doi.org/10.58496/bjn/2023/001.
Full textChen, Pei-Yu, and Frank Yeong-Sung Lin. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques." Journal of Applied Mathematics 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/207141.
Full textAnubha and P. S. Bed R. "Detection of Clone Attacks in Manets using Ant Colony Optimization." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 426–29. https://doi.org/10.35940/ijeat.C6297.049420.
Full textMano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.
Full textGuzhakovskaya, Kristina, and Yuriy Umnitsyn. "Protocol SS7 and the Security of Mobile Networks." NBI Technologies, no. 4 (February 2019): 6–11. http://dx.doi.org/10.15688/nbit.jvolsu.2018.4.1.
Full textQin, Huawang, Xiaohua Zhu, and Yuewei Dai. "A proactive quantum secret sharing scheme based on GHZ state." Modern Physics Letters B 29, no. 27 (2015): 1550165. http://dx.doi.org/10.1142/s0217984915501651.
Full textLi, Hui, Xuesong Pan, Xinluo Wang, Haonan Feng, and Chengjie Shi. "Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices." Wireless Communications and Mobile Computing 2020 (September 1, 2020): 1–14. http://dx.doi.org/10.1155/2020/8819790.
Full textHamsha and Nagaraj. "A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC REPORTS." International Journal of Network Security & Its Applications (IJNSA) 6, no. 5 (2014): 51–62. https://doi.org/10.5281/zenodo.7379495.
Full textDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Full textG., Theivanathan, P. Kavitha V., Magesh V., and Usharani M. "A Novel Cooperative of Cluster Member Nodes with Watchdog for Detecting Attacker Nodes." Research and Applications: Emerging Technologies 4, no. 2 (2022): 1–13. https://doi.org/10.5281/zenodo.7074623.
Full textSun, Da-Zhi, and Ji-Dong Zhong. "Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing." Security and Communication Networks 2021 (June 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/5598574.
Full textS Monish, Dr.K.Radhika, S Naveenkumar, and R Ponkumar. "Design and Implementation of ATM Security Using IOT." international journal of engineering technology and management sciences 9, no. 2 (2025): 234–43. https://doi.org/10.46647/ijetms.2025.v09i02.031.
Full textKaushik, Sheetal, Khushboo Tripathi, Rashmi Gupta, and Prerna Mahajan. "Performance optimization of multipath K-AOMDV protocol using SVM against blackhole attack." Journal of Autonomous Intelligence 7, no. 5 (2024): 1488. http://dx.doi.org/10.32629/jai.v7i5.1488.
Full textCadena Muñoz, Ernesto, Gustavo Chica Pedraza, and Alexander Aponte Moreno. "Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks." Future Internet 16, no. 12 (2024): 456. https://doi.org/10.3390/fi16120456.
Full textH, ATEEQ AHMED, SAMSON PAUL K, and HARISH KUMAR REDDY B. "ENHANCHING SECURITY FOR MANETs USING DISCRETE KEY GENERATIONS." International Journal of Engineering Technology and Management Sciences 4, no. 5 (2020): 45–48. http://dx.doi.org/10.46647/ijetms.2020.v04i05.008.
Full textParamasivan, B., and M. Kaliappan. "Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/608984.
Full textYonathan, Alfius. "Analysis of Twitter-based Malware Propagation using SIR Epidemic Model." Journal of Applied Information, Communication and Technology 5, no. 1 (2018): 11–19. http://dx.doi.org/10.33555/ejaict.v5i1.45.
Full textYongjin Park, Taeyong Park, Sung Tae Kim, and Jeong Hyun Yi. "Mobile Code Packing Scheme Based on Multi-partitioned Bytecode Wrapping." Research Briefs on Information and Communication Technology Evolution 2 (March 31, 2016): 117–23. http://dx.doi.org/10.56801/rebicte.v2i.40.
Full textSehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Impact of selective forwarding attack on AODV protocol in mobile wireless senor networks." International Journal of Engineering & Technology 7, no. 2.4 (2018): 157. http://dx.doi.org/10.14419/ijet.v7i2.4.13029.
Full textA., T. Ravi, and Gowri Priya N. "SECURING DATA IN MOBILE CLOUD COMPUTING USING CUBICAL TECHNIQUE FOR KEY MANAGEMENT." International Journal of Computational Research and Development 2, no. 1 (2017): 55–58. https://doi.org/10.5281/zenodo.546298.
Full textIyas, Alodat. "EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES." International Journal of Network Security & Its Applications (IJNSA) 13, no. 3 (2021): 15–26. https://doi.org/10.5281/zenodo.4922192.
Full textMalviya, Taruna, and Khushboo Sawant. "Impact of Vampire Attack on Performance of Wireless Sensor Networks: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 96. http://dx.doi.org/10.23956/ijarcsse.v7i8.31.
Full textGanpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.
Full textHuang, Qinglong, Haiping Huang, Wenming Wang, Qi Li, and Yuhan Wu. "An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices." Wireless Communications and Mobile Computing 2020 (December 18, 2020): 1–9. http://dx.doi.org/10.1155/2020/8888679.
Full textHeshem, A. El Zouka. "PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 4 (2015): 31–41. https://doi.org/10.5281/zenodo.8300141.
Full textJolin, J. S., A. Theophilus, and A. Kathirvel. "Two-factor Mutual Authentication with Fingerprint and MAC Address Validation." International Journal of Computer Network and Information Security 16, no. 6 (2024): 56–68. https://doi.org/10.5815/ijcnis.2024.06.05.
Full textManikumar, V. R. Balaji, Nirmala Paramanandham, and M. Murugan. "Guardian device for women - a survey and comparison study." Journal of Physics: Conference Series 2115, no. 1 (2021): 012030. http://dx.doi.org/10.1088/1742-6596/2115/1/012030.
Full textGopalakrishnan. "INTRUSION DETECTION IN MOBILE AD HOC NETWORK USING SECURE ROUTING FOR ATTACKER IDENTIFICATION PROTOCOL." American Journal of Applied Sciences 11, no. 8 (2014): 1391–97. http://dx.doi.org/10.3844/ajassp.2014.1391.1397.
Full textKim, Yongjin, and Ahmed Helmy. "CATCH: A protocol framework for cross-layer attacker traceback in mobile multi-hop networks." Ad Hoc Networks 8, no. 2 (2010): 193–213. http://dx.doi.org/10.1016/j.adhoc.2009.07.002.
Full textSaini, Mayank Singh, and Sheenu Rizvi. "Vulnerabilities in Android OS and Security of Android Devices." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 3, no. 1 (2022): 1–11. http://dx.doi.org/10.54060/jieee/003.01.004.
Full textMelnikova, Anastasia, and Igor Karmanov. "DEVELOPMENT OF THE METHODOLOGY FOR PENETRATION TESTING OF MOBILE AND WEB APPLICATIONS." Interexpo GEO-Siberia 9 (2019): 47–53. http://dx.doi.org/10.33764/2618-981x-2019-9-47-53.
Full textMathi, Senthil Kumar, Pavittra Kalyaan, Kanimozhi S., and Bhuvaneshwari S. "Integrating Non-linear and Linear Diffusion Techniques to Prevent Fault Attacks in Advanced Encryption Standard to Enhance Security of 4G-LTE Networks." Defence Science Journal 67, no. 3 (2017): 276. http://dx.doi.org/10.14429/dsj.67.10118.
Full textR. Kalaiselvi and P. Meenakshi Sundaram. "Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks." Scientific Temper 15, no. 04 (2024): 3196–204. https://doi.org/10.58414/scientifictemper.2024.15.4.29.
Full textJiang, Ruei Min, Jia Sian Jhang, Fu Hau Hsu, Yan Ling Hwang, Pei Wen Huang, and Yung Hoh Sheu. "JokerBot – An Android-Based Botnet." Applied Mechanics and Materials 284-287 (January 2013): 3454–58. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3454.
Full textRani, Pooja, Kavita, Sahil Verma, et al. "Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks." Sensors 22, no. 1 (2021): 251. http://dx.doi.org/10.3390/s22010251.
Full textLavrushkina, A. "Subject of fraud through the use of the network of Internet and means of mobile communication." Bulletin of Science and Practice 4, no. 3 (2018): 282–85. https://doi.org/10.5281/zenodo.1198758.
Full textJain, Ankit Kumar, and B. B. Gupta. "Feature Based Approach for Detection of Smishing Messages in the Mobile Environment." Journal of Information Technology Research 12, no. 2 (2019): 17–35. http://dx.doi.org/10.4018/jitr.2019040102.
Full text