Academic literature on the topic 'Passive attacks in MANET'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Passive attacks in MANET.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Passive attacks in MANET"
Sah, Raja Ram, Devendra Kumar Sahu, Nanda Satish Kulkarni, K. Venkata Ramana, Shikha Maheshwari, and Nagarjuna E. "OPTIMIZING MANET PERFORMANCE WITH IMPROVISED ALGORITHMIC INNOVATIONS FOR ENHANCED CONNECTIVITY AND SECURITY." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3195–99. http://dx.doi.org/10.21917/ijct.2024.0476.
Full textNigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.
Full textHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Full textKumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.
Full textM S, Usha, and K. C. Ravishankar Dr. "KEY DISTRIBUTION APPROACH TO MITIGATE PASSIVE ATTACKS IN MANET." Indian Journal of Computer Science and Engineering 11, no. 6 (2020): 819–24. http://dx.doi.org/10.21817/indjcse/2020/v11i6/201106111.
Full textTuan, Chiu Ching, Kuen Yang Chen, and Yi Chao Wu. "Preventive Security Mechanism Based on AODV." Advanced Materials Research 225-226 (April 2011): 565–68. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.565.
Full textBalla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.
Full textA., Priyadharshini. "Mitigating Selfish Misbehavior Attack in MANET by SMD Algorithm." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 07 (2018): 424–27. https://doi.org/10.5281/zenodo.1320417.
Full textRaut, Deepali, and Kapil Hande. "Detection and Prevention of Gray Hole and Black Hole Attack in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 5029–38. http://dx.doi.org/10.24297/ijct.v13i9.2407.
Full textPrasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.
Full textDissertations / Theses on the topic "Passive attacks in MANET"
Vu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.
Full textAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Full textSchellenberg, Falk [Verfasser], Christof [Gutachter] Paar, and Daniel [Gutachter] Holcomb. "Novel methods of passive and active side-channel attacks / Falk Schellenberg ; Gutachter: Christof Paar, Daniel Holcomb ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1175204986/34.
Full textSilva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.
Full textDjervbrant, Karl-Johan, and Andreas Häggström. "A Study on Fingerprinting of Locally Assigned MAC-Addresses." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-39749.
Full textGomina, Kamil. "Méthodologie et développement de solutions pour la sécurisation des circuits numériques face aux attaques en tensions." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0751.
Full textChang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.
Full textWright, Matthew K. "Passive logging attacks against anonymous communications systems." 2005. https://scholarworks.umass.edu/dissertations/AAI3179934.
Full textAlnaghes, Mnar Saeed. "An Approach to Defend Against Black hole Attacks in Ad Hoc Networks: Node Clustering AODV Protocol (CAODV)." Thesis, 2015. http://hdl.handle.net/1828/6753.
Full textChu-Ting, Teng, and 鄧竹庭. "It is a coincidental arrangement! Feint and response in planned passive attacks in Taekwondo sparring." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36tbj3.
Full textBooks on the topic "Passive attacks in MANET"
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks. No Starch Press, 2005.
Find full textSandler, Todd. Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/wentk/9780190845841.001.0001.
Full textPrusin, Alexander. “Serbia Is Quiet,” 1942–1944. University of Illinois Press, 2018. http://dx.doi.org/10.5406/illinois/9780252041068.003.0008.
Full textLeng, Thomas. Fellowship and Freedom. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198794479.001.0001.
Full textBartley, Abel A. Keeping the Faith. Greenwood Publishing Group, Inc., 2000. http://dx.doi.org/10.5040/9798400675553.
Full textOrtbals, Candice, and Lori Poloni-Staudinger. How Gender Intersects With Political Violence and Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190228637.013.308.
Full textBook chapters on the topic "Passive attacks in MANET"
Eid, Marwa M., and Noha A. Hikal. "Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58669-0_23.
Full textGuha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. "Bypassing Passive Attacks." In Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0_5.
Full textJha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.
Full textSardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Full textSimpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.
Full textMacFarland, Douglas C., Craig A. Shue, and Andrew J. Kalafut. "Characterizing Optimal DNS Amplification Attacks and Effective Mitigation." In Passive and Active Measurement. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15509-8_2.
Full textEnneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.
Full textHendriks, Luuk, Ricardo de Oliveira Schmidt, Roland van Rijswijk-Deij, and Aiko Pras. "On the Potential of IPv6 Open Resolvers for DDoS Attacks." In Passive and Active Measurement. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54328-4_2.
Full textNosyk, Yevheniya, Maciej Korczyński, and Andrzej Duda. "Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks." In Passive and Active Measurement. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98785-5_28.
Full textKopp, Daniel, Christoph Dietzel, and Oliver Hohlfeld. "DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks." In Passive and Active Measurement. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72582-2_17.
Full textConference papers on the topic "Passive attacks in MANET"
Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.
Full textZhang, Yanan, Huan Huang, Hongliang Zhang, et al. "Disco Intelligent Omni-Surface Based Fully-Passive Jamming Attacks." In 2024 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2024. http://dx.doi.org/10.1109/iccc62479.2024.10682037.
Full textA, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.
Full textGupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.
Full textNoureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.
Full textPatel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.
Full textChawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.
Full textSingh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.
Full textElakkiya M., Kaushik S., and Edna Elizabeth N. "Opportunistic routing to mitigate attacks in MANET." In 2014 Fourth International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2014. http://dx.doi.org/10.1109/icrtit.2014.6996116.
Full textRajakumar, P., Venkatesan T. Prasanna, and A. Pitchaikkannu. "Security attacks and detection schemes in MANET." In 2014 International Conference on Electronics and Communication Systems (ICECS). IEEE, 2014. http://dx.doi.org/10.1109/ecs.2014.6892808.
Full textReports on the topic "Passive attacks in MANET"
Tayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2132.
Full text