Artykuły w czasopismach na temat „ACTIVE attacks in MANET”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „ACTIVE attacks in MANET”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.
Pełny tekst źródłaHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Pełny tekst źródłaHarpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.
Pełny tekst źródłaRamachandran, Dhanagopal, Sasikumar S, Vallabhuni Rajeev Ratna, et al. "A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)." Security and Communication Networks 2022 (August 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/8067447.
Pełny tekst źródłaZalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.
Pełny tekst źródłaBalla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.
Pełny tekst źródłaBegum, Shifana. "An Efficient & Secure Timer Based baiting Approach to Detect Black Hole Attacks in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (2020): 29–32. http://dx.doi.org/10.46501/ijmtst060607.
Pełny tekst źródłaPatial, Atul. "Security Techniques in MANET: A Study." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1524–28. http://dx.doi.org/10.22214/ijraset.2021.39567.
Pełny tekst źródłaSharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.
Pełny tekst źródłaRao, Tandu Rama, and P. V. Nageswara Rao. "Innovative Technique to Detect and Prevent Malicious Nodes in AOMDV against Blackhole Attacks in MANET for Increase the Network Efficiency." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 9 (2022): 86–94. http://dx.doi.org/10.17762/ijritcc.v10i9.5708.
Pełny tekst źródłaYasin, Adwan, and Mahmoud Abu Zant. "Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique." Wireless Communications and Mobile Computing 2018 (September 6, 2018): 1–10. http://dx.doi.org/10.1155/2018/9812135.
Pełny tekst źródłaRajshree, Saxena*1 &. Dr. Raghav Mehra2. "A RESEARCH ON ROUTING PROTOCOLS AND SECURITY OF CHALLENGES IN MANETs." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 4, no. 6 (2017): 22–26. https://doi.org/10.5281/zenodo.583650.
Pełny tekst źródłaTuan, Chiu Ching, Kuen Yang Chen, and Yi Chao Wu. "Preventive Security Mechanism Based on AODV." Advanced Materials Research 225-226 (April 2011): 565–68. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.565.
Pełny tekst źródłaG, Jeeva, and Selvaraj K. "INVESTIGATION OF POTENTIAL MULTIPLE THREATS AND THEIR IMPACTS IN MANET." ICTACT Journal on Communication Technology 12, no. 2 (2021): 2407–13. http://dx.doi.org/10.21917/ijct.2021.0356.
Pełny tekst źródłaK., Thamizhmaran. "Secure Wireless Ad Hoc Sensor Networks." Journal of Sensor Research and Technologies 4, no. 2 (2022): 1–5. https://doi.org/10.5281/zenodo.7207904.
Pełny tekst źródłaJ, Viji Gripsy, Jayanthiladevi A, Mahendiran N, and Sheela Rini A. "SRDAODV: A Hybrid Secure Routing Protocol for Mobile Ad-Hoc Networks." Indian Journal of Science and Technology 16, no. 32 (2023): 2574–79. https://doi.org/10.17485/IJST/v16i32.1240.
Pełny tekst źródłaRaut, Deepali, and Kapil Hande. "Detection and Prevention of Gray Hole and Black Hole Attack in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 5029–38. http://dx.doi.org/10.24297/ijct.v13i9.2407.
Pełny tekst źródłaHadi, Raghad Mohammed, Salma Hameedi Abdullah, and Wafaa M. Salih Abedi. "Proposed neural intrusion detection system to detect denial of service attacks in MANETs." Periodicals of Engineering and Natural Sciences (PEN) 10, no. 3 (2022): 70–78. https://doi.org/10.21533/pen.v10.i3.644.
Pełny tekst źródłaPrasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.
Pełny tekst źródłaPrasad, K. D. V., D. Palanikkumar, Dankan Gowda V., Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5s (2023): 188–98. http://dx.doi.org/10.17762/ijritcc.v11i5s.6643.
Pełny tekst źródłaThamizhmaran, K. "Routing Protocol for Multipath in MANET." Journal of Communication Engineering and VLSI Design 1, no. 1 (2023): 24–26. http://dx.doi.org/10.48001/jocevd.2023.1124-26.
Pełny tekst źródłaSelvavinayaki, Dr K. "An Effectual Data Transmission Approach to Prevent Black Hole Attack in Mobile Adhoc Networks." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 526–40. http://dx.doi.org/10.17762/itii.v9i1.166.
Pełny tekst źródłaRathish, CR, K. Karpagavadivu, P. Sindhuja, and A. Kousalya. "A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET." Information Technology and Control 50, no. 1 (2021): 45–54. http://dx.doi.org/10.5755/j01.itc.50.1.25002.
Pełny tekst źródłaG., S. Sivagamasundari, and Thamizhmaran K. "Security Attack for Mobile Ad hoc Network using Hybrid Protocol called ZHLP." Journal of Emerging Trends in Electrical Engineering 4, no. 3 (2022): 1–6. https://doi.org/10.5281/zenodo.7349735.
Pełny tekst źródłaDeepa, J., K. Hemapriya K.Hemapriya, and S. Kaviarasan S.Kaviarasan. "Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes." International Journal of Computer Applications 113, no. 18 (2015): 30–33. http://dx.doi.org/10.5120/19927-2050.
Pełny tekst źródłaLiang, Yingbin, H. Vincent Poor, and Lei Ying. "Secrecy Throughput of MANETs Under Passive and Active Attacks." IEEE Transactions on Information Theory 57, no. 10 (2011): 6692–702. http://dx.doi.org/10.1109/tit.2011.2165800.
Pełny tekst źródłaK.Thamizhmaran. "Efficient Non-Base-Station based Wireless Communication in MANET." Advancement of Signal Processing and its Applications 8, no. 1 (2025): 9–11. https://doi.org/10.5281/zenodo.14650658.
Pełny tekst źródłaKavita, Babriya, and Singh Surender. "A Review Study on Preventing and Detecting Technique of Black Hole Attack in MANET." International Journal of Trend in Scientific Research and Development 1, no. 4 (2017): 375–79. https://doi.org/10.31142/ijtsrd129.
Pełny tekst źródłaV, Jayalakshmi, and Abdul Razak T. "Selection of Trusted Nodes in MANET by using Analytic Network Process." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 03 (2014): 657–62. https://doi.org/10.5281/zenodo.14715503.
Pełny tekst źródłaVaneetha, V., and C. Vivekanandan. "Efficient Interference Prediction Using Bivariate Moment Generating Function in Mobile Ad Hoc Network." Journal of Computational and Theoretical Nanoscience 14, no. 1 (2017): 314–20. http://dx.doi.org/10.1166/jctn.2017.6322.
Pełny tekst źródła., Mohd Faisal. "ATTACKS IN MANET." International Journal of Research in Engineering and Technology 02, no. 10 (2013): 273–76. http://dx.doi.org/10.15623/ijret.2013.0210040.
Pełny tekst źródłaNabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.
Pełny tekst źródłaGhodichor, Nitesh, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, and Ankush Sawarkar. "Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET." International journal of Computer Networks & Communications 15, no. 2 (2023): 127–46. http://dx.doi.org/10.5121/ijcnc.2023.15207.
Pełny tekst źródłaDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Pełny tekst źródłaSandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.
Pełny tekst źródłaArudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.
Pełny tekst źródłaV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Pełny tekst źródłaDeeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.
Pełny tekst źródłaChen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Pełny tekst źródłaAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Pełny tekst źródłaKakkar, Parveen, Pooja Sharma, and Krishan Saluja. "Vulnerability Assessment of Routing Protocols in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 11 (2018): 285–91. https://doi.org/10.5281/zenodo.1489366.
Pełny tekst źródłaJain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.
Pełny tekst źródłaShrivastava, Neha, and Anand Motwani. "Survey of Malicious Attacks in MANET." International Journal of Computer Applications 80, no. 14 (2013): 28–30. http://dx.doi.org/10.5120/13931-1916.
Pełny tekst źródłaArora, Jasleen, Paramjeet Singh, and Shaveta Rani. "Detecting and Preventing Attacks in MANET." International Journal of Computer Applications 81, no. 5 (2013): 14–18. http://dx.doi.org/10.5120/14007-2056.
Pełny tekst źródłaHemalatha, S., Harikumar Pallathadka, Rajesh P. Chinhewadi, D. Kalaiyarasi, and B. Anni Princy. "Challenges on Missing Packet Detection or Packet Dropping Attacks in Mobile Adhoc Network -A Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 676–80. http://dx.doi.org/10.17762/ijritcc.v11i8s.7255.
Pełny tekst źródłaA.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.
Pełny tekst źródłaPunya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.
Pełny tekst źródłaBaba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Pełny tekst źródłaSuganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.
Pełny tekst źródłaSafdar Malik, Tauqeer, Muhammad Nasir Siddiqui, Muhammad Mateen, Kaleem Razzaq Malik, Song Sun, and Junhao Wen. "Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring." Security and Communication Networks 2022 (April 29, 2022): 1–18. http://dx.doi.org/10.1155/2022/4943218.
Pełny tekst źródła