Gotowa bibliografia na temat „ACTIVE attacks in MANET”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „ACTIVE attacks in MANET”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "ACTIVE attacks in MANET"
Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.
Pełny tekst źródłaHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Pełny tekst źródłaHarpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.
Pełny tekst źródłaRamachandran, Dhanagopal, Sasikumar S, Vallabhuni Rajeev Ratna, et al. "A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)." Security and Communication Networks 2022 (August 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/8067447.
Pełny tekst źródłaZalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.
Pełny tekst źródłaBalla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.
Pełny tekst źródłaBegum, Shifana. "An Efficient & Secure Timer Based baiting Approach to Detect Black Hole Attacks in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (2020): 29–32. http://dx.doi.org/10.46501/ijmtst060607.
Pełny tekst źródłaPatial, Atul. "Security Techniques in MANET: A Study." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1524–28. http://dx.doi.org/10.22214/ijraset.2021.39567.
Pełny tekst źródłaSharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.
Pełny tekst źródłaRao, Tandu Rama, and P. V. Nageswara Rao. "Innovative Technique to Detect and Prevent Malicious Nodes in AOMDV against Blackhole Attacks in MANET for Increase the Network Efficiency." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 9 (2022): 86–94. http://dx.doi.org/10.17762/ijritcc.v10i9.5708.
Pełny tekst źródłaRozprawy doktorskie na temat "ACTIVE attacks in MANET"
Markettos, Athanasios Theodore. "Active electromagnetic attacks on secure hardware." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609203.
Pełny tekst źródłaVu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.
Pełny tekst źródłaAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Pełny tekst źródłaSchellenberg, Falk [Verfasser], Christof [Gutachter] Paar, and Daniel [Gutachter] Holcomb. "Novel methods of passive and active side-channel attacks / Falk Schellenberg ; Gutachter: Christof Paar, Daniel Holcomb ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1175204986/34.
Pełny tekst źródłaR, V. Saraswathy. "Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1521192556946491.
Pełny tekst źródłaSilva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.
Pełny tekst źródłaCioranesco, Jean-Michel. "Nouvelles Contre-Mesures pour la Protection de Circuits Intégrés." Thesis, Paris 1, 2014. http://www.theses.fr/2014PA010022/document.
Pełny tekst źródłaIzagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.
Pełny tekst źródłaTrabé, Patrick. "Infrastructure réseau coopérative et flexible de défense contre les attaques de déni de service distribué." Toulouse 3, 2006. http://www.theses.fr/2006TOU30288.
Pełny tekst źródłaAlkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.
Pełny tekst źródłaKsiążki na temat "ACTIVE attacks in MANET"
1946-, Bush George W., United States. Congress. House. Committee on International Relations, and United States. Congress. House. Committee on Armed Services, eds. Declaration of national emergency by reason of certain terrorist attacks: Message from the President of the United States transmitting his declaration of a national emergency by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States and his executive order to order the ready reserve of the Armed forces to active duty and delegating certain authorities to the secretaries of defense and transportation, pursuant to 50 U.S.C. 1621(a). U.S. G.P.O., 2001.
Znajdź pełny tekst źródłaActive Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaHyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaBurrese, Alain. Survive A Shooting: Strategies to Survive Active Shooters and Terrorist Attacks. TGW Books, 2018.
Znajdź pełny tekst źródłaDepartment of Defense. Armed Deterrence: Countering Soft Target Attacks - Open Carry Firearms Policy for ROTC Detachments for Protection from Mass Shootings, Active Shooters and Self-Radicalized Lone-Wolf Terrorist Attacks. Independently Published, 2019.
Znajdź pełny tekst źródłaWarren, Mark, and Vaughn Baker. Active Threat : Workplace 911: An Expert Guide to Preventing, Preparing for and Prevailing over Attacks at Work, School and Church. Independently Published, 2018.
Znajdź pełny tekst źródłaCzęści książek na temat "ACTIVE attacks in MANET"
Eid, Marwa M., and Noha A. Hikal. "Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58669-0_23.
Pełny tekst źródłaSchnoor, Henning, and Oliver Woizekowski. "Active Linking Attacks." In Mathematical Foundations of Computer Science 2015. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48054-0_46.
Pełny tekst źródłaGuha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. "Counteracting Active Attacks." In Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0_6.
Pełny tekst źródłaJha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.
Pełny tekst źródłaDe Ciercq, Jan. "Deflecting Active Directory Attacks." In ISSE 2006 — Securing Electronic Busines Processes. Vieweg, 2006. http://dx.doi.org/10.1007/978-3-8348-9195-2_18.
Pełny tekst źródłaSardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Pełny tekst źródłaSimpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.
Pełny tekst źródłaAyala, Luis. "Active Medical Device Cyber-Attacks." In Cybersecurity for Hospitals and Healthcare Facilities. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2155-6_3.
Pełny tekst źródłaChen, Eric Y. "AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks." In Active Networks. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45451-9_1.
Pełny tekst źródłaEnneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.
Pełny tekst źródłaStreszczenia konferencji na temat "ACTIVE attacks in MANET"
Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.
Pełny tekst źródłaJeter, Tre' R., Truc Nguyen, Raed Alharbi, and My T. Thai. "OASIS: Offsetting Active Reconstruction Attacks in Federated Learning." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00097.
Pełny tekst źródłaTan, En Jie, Kowit Tan, Royce Yu Feng Chong, et al. "Simulation of Pre-Ransomware Attacks on Active Directory." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871611.
Pełny tekst źródłaA, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.
Pełny tekst źródłaDora, Jean Rosemond, and Ladislav Hluchy. "Attacks on Active Directory - Kerberos Delegation: *Exploitation of Active Directory using Kerberos Constrained Delegation." In 2024 IEEE 6th International Symposium on Logistics and Industrial Informatics (LINDI). IEEE, 2024. https://doi.org/10.1109/lindi63813.2024.10820404.
Pełny tekst źródłaGupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.
Pełny tekst źródłaNoureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.
Pełny tekst źródłaPatel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.
Pełny tekst źródłaChawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.
Pełny tekst źródłaSingh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.
Pełny tekst źródłaRaporty organizacyjne na temat "ACTIVE attacks in MANET"
Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies, 2022. http://dx.doi.org/10.55271/5jchdy.
Pełny tekst źródłaYilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/rp0001.
Pełny tekst źródłaMonthly Infographics Report: March 2024. Microgovernance Research Initiative (MGR), 2024. http://dx.doi.org/10.57189/mgrinfmar24.
Pełny tekst źródłaMGR Quarterly Infographics Report: April – June, 2024. Microgovernance Research Initiative (MGR), 2024. http://dx.doi.org/10.57189/mgrinfq6aj24.
Pełny tekst źródła