Gotowa bibliografia na temat „Grey Hole Attack”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Grey Hole Attack”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Grey Hole Attack"
Kaur, Rupinder, and Parminder Singh. "Review of Black Hole and Grey Hole Attack." International journal of Multimedia & Its Applications 6, no. 6 (2014): 35–45. http://dx.doi.org/10.5121/ijma.2014.6603.
Pełny tekst źródłaK., T. Gowdhami, and Nithya D. "DESIGN AND ANALYSIS OF SECURE VANET FRAMEWORK PREVENTING SINK HOLE AND GRAY HOLE ATTACK." International Journal of Advanced Trends in Engineering and Technology 2, no. 1 (2017): 55–59. https://doi.org/10.5281/zenodo.495747.
Pełny tekst źródłaC, Gowdham, and Dr Parvatham Vijay N. "Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (2020): 104–15. http://dx.doi.org/10.5373/jardcs/v12i8/20202452.
Pełny tekst źródłaDr., Srinivas Ambala* Dr. Ravi Kumar Yeatha. "ANALYSIS AND REVIEW ON VARIOUS SECURITY ISSUES AND THEIR PREVENTION TECHNIQUES IN THE AD-HOC SENSOR NETWORKS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 2 (2017): 309–14. https://doi.org/10.5281/zenodo.290263.
Pełny tekst źródłaJasvir, Markandy1 Manmohan Sharma2. "DIMINISH THE FLOODING ATTACK USING MUTUAL AUTHENTICATION IN MOBILE AD-HOC NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 5 (2018): 24–30. https://doi.org/10.5281/zenodo.1241365.
Pełny tekst źródłaJ, Viji Gripsy, Jayanthiladevi A, Mahendiran N, and Sheela Rini A. "SRDAODV: A Hybrid Secure Routing Protocol for Mobile Ad-Hoc Networks." Indian Journal of Science and Technology 16, no. 32 (2023): 2574–79. https://doi.org/10.17485/IJST/v16i32.1240.
Pełny tekst źródłaK., Thamizhmaran. "Effective Communication in Infrastructure less Wireless Network using PQ Scheduling Algorithm." Journal of Optoelectronics and Communication 5, no. 3 (2023): 33–39. https://doi.org/10.5281/zenodo.10088679.
Pełny tekst źródłaGeete, Kanu, Piyush Kumar Shukla, and Anjana Jayant Deen. "A Survey on Grey Hole Attack in Wireless mesh Networks." International Journal of Computer Applications 95, no. 23 (2014): 23–29. http://dx.doi.org/10.5120/16736-7019.
Pełny tekst źródłaShiranzaei, Atena, and Farhad Khoshbakht. "A Novel Detection Method for Grey Hole Attack in RPL." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (2023): 492–97. http://dx.doi.org/10.17762/ijritcc.v11i7s.7027.
Pełny tekst źródłaK., Thamizhmaran. "SCHEDULING ALGORITHM IN INFRASTRUCTURELESS NETWORK." Journal of Emerging Trends in Electrical Engineering 5, no. 3 (2023): 16–19. https://doi.org/10.5281/zenodo.10147509.
Pełny tekst źródłaRozprawy doktorskie na temat "Grey Hole Attack"
Hsieh, Yi-Ting, and 謝易廷. "Detection of Gray Hole attack in Software Define Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/868sjw.
Pełny tekst źródłaKsiążki na temat "Grey Hole Attack"
Kennedy, Thomas C. Quakers. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199683710.003.0004.
Pełny tekst źródłaCzęści książek na temat "Grey Hole Attack"
Musale, Sandeep S., Sandeep L. Dhende, S. D. Shirbahadurkar, and Anand S. Najan. "Gray Hole and Cooperative Attack Prevention Protocol for MANETs." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1501-5_49.
Pełny tekst źródłaLiu, Dezhi, and Zhen Guo. "A Lightweight Detection Scheme for the Black-Hole Attacks and Gray-Hole Attacks in VANETs." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-1548-3_16.
Pełny tekst źródłaGeetanjali Rathee and Hemraj Saini. "Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network." In Proceedings of the International Congress on Information and Communication Technology. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0755-2_41.
Pełny tekst źródłaRao, Sunil Poyyagadde, Deepak Devaru Joshi, and Juzi Zhao. "Machine Learning Based Detection of Gray-Hole Attack in Mobile Ad-Hoc Networks." In 3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44372-6_13.
Pełny tekst źródłaChawla, Priya, and Monika Sachdeva. "Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6005-2_41.
Pełny tekst źródłaDoshi, Chintan Ketankumar, Sreecharan Sankaranarayanan, Vidyashankar B. Lakshman, and K. Chandrasekaran. "Game Theoretic Modeling of Gray Hole Attacks in Wireless Ad Hoc Networks." In Lecture Notes in Electrical Engineering. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-3592-7_21.
Pełny tekst źródłaDeepali Virmani and Pranav Gupta. "Adaptive Exponential Trust-Based Algorithm in Wireless Sensor Network to Detect Black Hole and Gray Hole Attacks." In Emerging Research in Computing, Information, Communication and Applications. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0287-8_6.
Pełny tekst źródłaNeha, Gurjot Kaur Walia, and Harminder Kaur. "A Cipher Based Acknowledgement Approach for Securing MANETs by Mitigating Black and Gray Hole Attacks." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0755-3_16.
Pełny tekst źródłaKurtkoti, Mahesh, B. S. Premananda, and K. Vishwavardhan Reddy. "Performance Analysis of Machine Learning Algorithms in Detecting and Mitigating Black and Gray Hole Attacks." In Innovative Data Communication Technologies and Application. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7167-8_69.
Pełny tekst źródłaSelvik, Kjetil, and Jacob Høigilt. "National Security and Free Speech in Tunisia." In Journalism in the Grey Zone. Edinburgh University Press, 2023. http://dx.doi.org/10.3366/edinburgh/9781399515818.003.0006.
Pełny tekst źródłaStreszczenia konferencji na temat "Grey Hole Attack"
Mohapata, Soumya Ranjan, Rekha Jain, Srinivas Koushik K, Sandeep Varma Kalidindi, and Umashankar Ghugar. "TBNDG: Trust-Based Malicious Node Detection for Grey-Hole Attacks in VANET’s." In 2024 Eighth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2024. https://doi.org/10.1109/pdgc64653.2024.10984014.
Pełny tekst źródłaVimalnath, S., R. Midhun, A. S. Kavinesh, P. Karvendan, and K. Kishore. "Enhanced Security Framework for Gray-Hole Attack Prevention in Vehicular Networks." In 2025 International Conference on Visual Analytics and Data Visualization (ICVADV). IEEE, 2025. https://doi.org/10.1109/icvadv63329.2025.10961129.
Pełny tekst źródłaM, Arunkumar, Janaranjani M, and Pavithra K. "A Proactive Approach for Securing VANETs Against Gray-Hole Attacks." In 2025 3rd International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC). IEEE, 2025. https://doi.org/10.1109/isacc65211.2025.10969306.
Pełny tekst źródłaNagalakshmi, T. J., and R. Samar Kumar. "Comparative Analysis of Random Forest and Decision Tree for Gray Hole Attack Detection in Wireless Ad Hoc Networks." In 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE). IEEE, 2024. http://dx.doi.org/10.1109/icspcre62303.2024.10675140.
Pełny tekst źródłaKanaparthi, Venkata Murali Mohan, and Krishna Vempati. "Grey hole attack in mobile ad-hoc network mitigation and protection." In WOMEN IN PHYSICS: 7th IUPAP International Conference on Women in Physics. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0181902.
Pełny tekst źródłaKumar, R. Samar, and T. J. Nagalakshmi. "Design of intrusion detection system in the detection of grey hole attack in wireless ad hoc network using K-means cluster comparing with decision tree." In FIFTH INTERNATIONAL CONFERENCE ON APPLIED SCIENCES: ICAS2023. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0197407.
Pełny tekst źródłaPatil, Sarika U. "Gray hole attack detection in MANETs." In 2017 2nd International Conference for Convergence in Technology (I2CT). IEEE, 2017. http://dx.doi.org/10.1109/i2ct.2017.8226087.
Pełny tekst źródłaVerma, Swati, Bhawna Mallick, and Poonam Verma. "Impact of gray hole attack in VANET." In 2015 1st International Conference on Next Generation Computing Technologies (NGCT). IEEE, 2015. http://dx.doi.org/10.1109/ngct.2015.7375097.
Pełny tekst źródłaChadha, Kriti, and Sushma Jain. "Impact of black hole and gray hole attack in AODV protocol." In 2014 Recent Advances and Innovations in Engineering (ICRAIE). IEEE, 2014. http://dx.doi.org/10.1109/icraie.2014.6909188.
Pełny tekst źródłaDhende, Sandeep, Sandeep Musale, Suresh Shirbahadurkar, and Anand Najan. "SAODV: Black hole and gray hole attack detection protocol in MANETs." In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017. http://dx.doi.org/10.1109/wispnet.2017.8300188.
Pełny tekst źródła