Gotowa bibliografia na temat „ACTIVE attacks in MANET”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „ACTIVE attacks in MANET”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "ACTIVE attacks in MANET"

1

Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.

Pełny tekst źródła
Streszczenie:
Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, we focus on Black Hole attack in Mobile adhoc networks. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing att
Style APA, Harvard, Vancouver, ISO itp.
2

Hikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.

Pełny tekst źródła
Streszczenie:
Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in M
Style APA, Harvard, Vancouver, ISO itp.
3

Harpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.

Pełny tekst źródła
Streszczenie:
In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to han
Style APA, Harvard, Vancouver, ISO itp.
4

Ramachandran, Dhanagopal, Sasikumar S, Vallabhuni Rajeev Ratna, et al. "A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)." Security and Communication Networks 2022 (August 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/8067447.

Pełny tekst źródła
Streszczenie:
Security in MANETs is a highly contentious topic in the field of network management. The availability and functionality of a MANET might be compromised by a variety of attacks. One of the most prevalent active attacks used to degrade network speed and reliability is the black hole attack, which leads the compromised agent to discard all data packets. The purpose of a black hole node is to trick other access points into thinking that they must use their node as their route to a certain destination. The black hole node in a cable network cannot be detected or eliminated in an AODV network. We im
Style APA, Harvard, Vancouver, ISO itp.
5

Zalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.

Pełny tekst źródła
Streszczenie:
This paper discusses an improved mechanism to mitigate the DDoS attack in Mobile Ad-hoc Network (MANET) without compromising the packet delivery ratio. MANET inherently has geographically sparse mobile nodes more vulnerable to various attackers more radically the DDoS type. Moreover it emanates open medium, absence of centralized authority, lack of clear line of defense that leads to more vulnerability towards secure environment. Since there are no hindrances for non-legitimate nodes, which allows them to freely enter and exit from the network at anytime, various active attacks like black hole
Style APA, Harvard, Vancouver, ISO itp.
6

Balla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.

Pełny tekst źródła
Streszczenie:
MANET is one of self configuring fastest emerging wireless technology. MANET is multi-hop wireless network of autonomous mobile nodes with no preset infrastructure where each node can move in any direction as well play a role of router. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among pair of nodes. Therefore many proactive, reactive & hybrid routing protocols have been proposed, among which one of well known is AODV due to its high performance gain. Cooperative nature of nodes exposes MANET to various kinds of passive &amp
Style APA, Harvard, Vancouver, ISO itp.
7

Begum, Shifana. "An Efficient & Secure Timer Based baiting Approach to Detect Black Hole Attacks in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (2020): 29–32. http://dx.doi.org/10.46501/ijmtst060607.

Pełny tekst źródła
Streszczenie:
Mobile Ad hoc Network (MANET) is a type of wireless networks that provides numerous applications in different areas. Security of MANET had become one of the hottest topics in networks fields. MANET is vulnerable to different types of attacks that affect its functionality and connectivity. The black-hole attack is considered one of the mostwide spread active attacks that degrade the performance and reliability of the network as a result of dropping all incoming packets by the malicious node. Black-hole node aims to fool every node in the network that wants to communicate with another node by pr
Style APA, Harvard, Vancouver, ISO itp.
8

Patial, Atul. "Security Techniques in MANET: A Study." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1524–28. http://dx.doi.org/10.22214/ijraset.2021.39567.

Pełny tekst źródła
Streszczenie:
Abstract: MANET (mobile ad hoc network) is considered to be a network with no centralized control. This network typically faces two major challenges related to routing and security. Both these issues affect the performance of this network to a large extent. The black hole attack belongs to the category of active attacks that are launched to reduce the network throughput and other parameters. The research works carried out in the past used different techniques to isolate malicious nodes, but with the inclusion of extra hardware and software tools. The various techniques for the security in MANE
Style APA, Harvard, Vancouver, ISO itp.
9

Sharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.

Pełny tekst źródła
Streszczenie:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of the high demand in sharing streaming video and audio in various applications .Once MANET is setup it quickly facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that have
Style APA, Harvard, Vancouver, ISO itp.
10

Rao, Tandu Rama, and P. V. Nageswara Rao. "Innovative Technique to Detect and Prevent Malicious Nodes in AOMDV against Blackhole Attacks in MANET for Increase the Network Efficiency." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 9 (2022): 86–94. http://dx.doi.org/10.17762/ijritcc.v10i9.5708.

Pełny tekst źródła
Streszczenie:
The Ad hoc on-demand multipath distance vector (AOMDV) routing protocol is one type of reactive routing protocol used in MANET. It is designed on top of the AODV routing protocol, so it utilizes the features of the AODV protocol. The MANET is a wireless ad hoc network without any physical infrastructure; all nodes can be moved across the network, and connections are made between them as needed simply with the help of RREQ, RREP, and RERR packets. Because the network is dynamic, nodes can quickly join and depart anytime. So far, no security threats have been caused by this feature. The blackhol
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "ACTIVE attacks in MANET"

1

Markettos, Athanasios Theodore. "Active electromagnetic attacks on secure hardware." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609203.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Vu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.

Pełny tekst źródła
Streszczenie:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of high demand in sharing streaming video and audio in various applications, one MANET could be setup quickly to facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that hav
Style APA, Harvard, Vancouver, ISO itp.
3

Alam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.

Pełny tekst źródła
Streszczenie:
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, disruption of the medium access control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks o
Style APA, Harvard, Vancouver, ISO itp.
4

Schellenberg, Falk [Verfasser], Christof [Gutachter] Paar, and Daniel [Gutachter] Holcomb. "Novel methods of passive and active side-channel attacks / Falk Schellenberg ; Gutachter: Christof Paar, Daniel Holcomb ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1175204986/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

R, V. Saraswathy. "Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1521192556946491.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Silva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.

Pełny tekst źródła
Streszczenie:
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento
Style APA, Harvard, Vancouver, ISO itp.
7

Cioranesco, Jean-Michel. "Nouvelles Contre-Mesures pour la Protection de Circuits Intégrés." Thesis, Paris 1, 2014. http://www.theses.fr/2014PA010022/document.

Pełny tekst źródła
Streszczenie:
Les domaines d'application de la cryptographie embarquée sont très divers et se retrouvent au croisement de toutes les applications personnelles, avec un besoin évident de confidentialité des données et également de sécurité d'accès des moyens de paiement. Les attaques matérielles invasives ont fait de tous temps partie de l'environnement industriel. L'objectif de cette thèse est de proposer de nouvelles solutions pour protéger les circuits intégrés contre ces attaques physiques. La première partie décrit les notions d'attaques par canaux cachés, d'attaques invasives et de retro-conception. Pl
Style APA, Harvard, Vancouver, ISO itp.
8

Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Pełny tekst źródła
Streszczenie:
The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. Existing misuse and anomaly-based detection and prevention techniques fail to cope with the volume and sophistication of new attacks that are continuously appearing, which suggests that there is a need t
Style APA, Harvard, Vancouver, ISO itp.
9

Trabé, Patrick. "Infrastructure réseau coopérative et flexible de défense contre les attaques de déni de service distribué." Toulouse 3, 2006. http://www.theses.fr/2006TOU30288.

Pełny tekst źródła
Streszczenie:
Les attaques par déni de service distribué (DDoS, Distributed Denial of Service) consistent à limiter ou à empêcher l'accès à un service informatique. La disponibilité du service proposé par la victime est altérée soit par la consommation de la bande passante disponible sur son lien, soit à l'aide d'un nombre très important de requêtes dont le traitement surconsomme les ressources dont elle dispose. Le filtrage des DDoS constitue aujourd'hui encore un problème majeur pour les opérateurs. Le trafic illégitime ne comporte en effet que peu ou pas de différences par rapport au trafic légitime. Ces
Style APA, Harvard, Vancouver, ISO itp.
10

Alkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.

Pełny tekst źródła
Streszczenie:
Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under “normal” system state conditions and can consequently help identify security breaches not addressed by current standards. This study of RFID traffic characterization considers two piecewise-constant data smoothing
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "ACTIVE attacks in MANET"

1

1946-, Bush George W., United States. Congress. House. Committee on International Relations, and United States. Congress. House. Committee on Armed Services, eds. Declaration of national emergency by reason of certain terrorist attacks: Message from the President of the United States transmitting his declaration of a national emergency by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States and his executive order to order the ready reserve of the Armed forces to active duty and delegating certain authorities to the secretaries of defense and transportation, pursuant to 50 U.S.C. 1621(a). U.S. G.P.O., 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Hyderkhan, Scott. Active Shooter Response Training: Lone Wolf to Coordinated Attacks. Taylor & Francis Group, 2020.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Burrese, Alain. Survive A Shooting: Strategies to Survive Active Shooters and Terrorist Attacks. TGW Books, 2018.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Department of Defense. Armed Deterrence: Countering Soft Target Attacks - Open Carry Firearms Policy for ROTC Detachments for Protection from Mass Shootings, Active Shooters and Self-Radicalized Lone-Wolf Terrorist Attacks. Independently Published, 2019.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Warren, Mark, and Vaughn Baker. Active Threat : Workplace 911: An Expert Guide to Preventing, Preparing for and Prevailing over Attacks at Work, School and Church. Independently Published, 2018.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "ACTIVE attacks in MANET"

1

Eid, Marwa M., and Noha A. Hikal. "Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58669-0_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Schnoor, Henning, and Oliver Woizekowski. "Active Linking Attacks." In Mathematical Foundations of Computer Science 2015. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48054-0_46.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Guha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. "Counteracting Active Attacks." In Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

De Ciercq, Jan. "Deflecting Active Directory Attacks." In ISSE 2006 — Securing Electronic Busines Processes. Vieweg, 2006. http://dx.doi.org/10.1007/978-3-8348-9195-2_18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Simpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ayala, Luis. "Active Medical Device Cyber-Attacks." In Cybersecurity for Hospitals and Healthcare Facilities. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2155-6_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Chen, Eric Y. "AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks." In Active Networks. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45451-9_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Enneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "ACTIVE attacks in MANET"

1

Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Jeter, Tre' R., Truc Nguyen, Raed Alharbi, and My T. Thai. "OASIS: Offsetting Active Reconstruction Attacks in Federated Learning." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00097.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Tan, En Jie, Kowit Tan, Royce Yu Feng Chong, et al. "Simulation of Pre-Ransomware Attacks on Active Directory." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871611.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

A, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Dora, Jean Rosemond, and Ladislav Hluchy. "Attacks on Active Directory - Kerberos Delegation: *Exploitation of Active Directory using Kerberos Constrained Delegation." In 2024 IEEE 6th International Symposium on Logistics and Industrial Informatics (LINDI). IEEE, 2024. https://doi.org/10.1109/lindi63813.2024.10820404.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Gupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Noureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Patel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Chawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Singh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "ACTIVE attacks in MANET"

1

Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies, 2022. http://dx.doi.org/10.55271/5jchdy.

Pełny tekst źródła
Streszczenie:
Turkey, Pakistan, India, Malaysia, and Indonesia span one of the longest continuously inhabited regions of the world. Centuries of cultural infusion have ensured these societies are highly heterogeneous. As plural polities, they are ripe for the kind of freedoms that liberal democracy can guarantee. However, despite having multi-party electoral systems, these countries have recently moved toward populist authoritarianism. Populism —once considered a distinctively Latin American problem that only seldom reared its head in other parts of the world— has now found a home in almost every corner of
Style APA, Harvard, Vancouver, ISO itp.
2

Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/rp0001.

Pełny tekst źródła
Streszczenie:
Turkey, Pakistan, India, Malaysia, and Indonesia span one of the longest continuously inhabited regions of the world. Centuries of cultural infusion have ensured these societies are highly heterogeneous. As plural polities, they are ripe for the kind of freedoms that liberal democracy can guarantee. However, despite having multi-party electoral systems, these countries have recently moved toward populist authoritarianism. Populism —once considered a distinctively Latin American problem that only seldom reared its head in other parts of the world— has now found a home in almost every corner of
Style APA, Harvard, Vancouver, ISO itp.
3

Monthly Infographics Report: March 2024. Microgovernance Research Initiative (MGR), 2024. http://dx.doi.org/10.57189/mgrinfmar24.

Pełny tekst źródła
Streszczenie:
MGR recorded 1503 violent incidents during March 2024, mostly triggered by politics, access to resources, and other socio-economic factors. More than 242 deaths and 2698 injuries have been recorded from these incidents. The highest number of violent incidents have been recorded in the form of clashes and attacks (426). Some 153 incidents are directly political violence, protests and arrests which resulted in 16 deaths. Geographically, Chittagong (351) scores the highest number of violence followed by Dhaka (306), Rajshahi (244) and Barishal (213). There were 86 protests and demonstrations and
Style APA, Harvard, Vancouver, ISO itp.
4

MGR Quarterly Infographics Report: April – June, 2024. Microgovernance Research Initiative (MGR), 2024. http://dx.doi.org/10.57189/mgrinfq6aj24.

Pełny tekst źródła
Streszczenie:
MGR recorded 3827 violent incidents during April to June 2024, mostly triggered by politics, access to resources, and other socio-economic factors. More than 770 deaths and 4356 injuries have been recorded from these incidents. The highest number of violent incidents have been recorded in the form of clashes and attacks (1318). Some 746 incidents are directly political violence, protests and arrests which resulted in 92 deaths. Geographically, Dhaka (895) scores the highest number of violence followed by Chittagong (890), Rajshahi (650) and Barishal (484). There were 199 protests and demonstra
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!