Gotowa bibliografia na temat „MANET attacks”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „MANET attacks”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "MANET attacks"
Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Pełny tekst źródłaSandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.
Pełny tekst źródłaAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Pełny tekst źródłaV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Pełny tekst źródłaSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Pełny tekst źródłaDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Pełny tekst źródłaM. Shivashankar, Et al. "Evading and Averting the Sybil Attack in Manets Using Mac Hash Message Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1160–66. http://dx.doi.org/10.17762/ijritcc.v11i9.9025.
Pełny tekst źródłaMurugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.
Pełny tekst źródłaKancharakuntla, Deepika, and Hosam El-Ocla. "EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks." Electronics 11, no. 21 (2022): 3480. http://dx.doi.org/10.3390/electronics11213480.
Pełny tekst źródłaYusri Dak, Ahmad, Noor Elaiza Abdul Khalid, and Saadiah Yahya. "Integrated Combined Layer Algorithm (ICLA) for Jamming Detection in MANET." International Journal of Engineering & Technology 7, no. 3.15 (2018): 24. http://dx.doi.org/10.14419/ijet.v7i3.15.17400.
Pełny tekst źródłaRozprawy doktorskie na temat "MANET attacks"
Vu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.
Pełny tekst źródłaAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Pełny tekst źródłaUr-Rehman, Shoaib, and Irshan Ullah. "Analysis of Black Hole attack on MANETs Using different MANET routing protocol." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1151.
Pełny tekst źródłaULLAH, IRSHAD, and SHOAIB UR REHMAN. "Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2505.
Pełny tekst źródłaSilva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.
Pełny tekst źródłaChang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.
Pełny tekst źródłaAlnaghes, Mnar Saeed. "An Approach to Defend Against Black hole Attacks in Ad Hoc Networks: Node Clustering AODV Protocol (CAODV)." Thesis, 2015. http://hdl.handle.net/1828/6753.
Pełny tekst źródłaSai, Keerthi T. Divya. "Designing Solutions to Counter the Attacks in Mobile Ad hoc Networks." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5315.
Pełny tekst źródłaGuo, Yinghua. "Defending MANETs against flooding attacks by detective measures." 2008. http://arrow.unisa.edu.au:8081/1959.8/45723.
Pełny tekst źródłaHsu, Yu-Wei, and 許祐瑋. "A Study of Black Hole Attacks Prevention in MANETs." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/qqdchv.
Pełny tekst źródłaKsiążki na temat "MANET attacks"
Amiri, Iraj Sadegh, Elahe Fazeldehkordi, and Oluwatobi Ayodeji Akanbi. Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET. Elsevier Science & Technology Books, 2015.
Znajdź pełny tekst źródłaAmiri, Iraj Sadegh, Elahe Fazeldehkordi, and Oluwatobi Ayodeji Akanbi. Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET. Elsevier Science & Technology Books, 2015.
Znajdź pełny tekst źródłaCzęści książek na temat "MANET attacks"
Jha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.
Pełny tekst źródłaSardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Pełny tekst źródłaSimpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.
Pełny tekst źródłaEnneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.
Pełny tekst źródłaSaab, Farah, and Mariette Awad. "Modeling Attacks on MANET Using an Incomplete Repeated Bayesian Game." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-11310-4_24.
Pełny tekst źródłaBalasubramani, S., S. K. Rani, and K. Suja Rajeswari. "Review on Security Attacks and Mechanism in VANET and MANET." In Advances in Intelligent Systems and Computing. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-2656-7_60.
Pełny tekst źródłaPani, Niroj Kumar, and Sarojananda Mishra. "Secure Hybrid Routing for MANET Resilient to Internal and External Attacks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_49.
Pełny tekst źródłaKhan, Muhammad Saleem, Qasim Khan Jadoon, and Majid I. Khan. "A Comparative Performance Analysis of MANET Routing Protocols under Security Attacks." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47669-7_16.
Pełny tekst źródłaEbinger, Peter, and Tobias Bucher. "Modelling and Analysis of Attacks on the MANET Routing in AODV." In Ad-Hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11814764_24.
Pełny tekst źródłaChaba, Yogesh, Yudhvir Singh, Kanwar Preet Singh, and Prabha Rani. "Performance Modeling of MANET Routing Protocols with Multiple Mode Wormhole Attacks." In Information and Communication Technologies. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15766-0_78.
Pełny tekst źródłaStreszczenia konferencji na temat "MANET attacks"
Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.
Pełny tekst źródłaA, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.
Pełny tekst źródłaGupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.
Pełny tekst źródłaNoureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.
Pełny tekst źródłaPatel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.
Pełny tekst źródłaChawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.
Pełny tekst źródłaSingh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.
Pełny tekst źródłaElakkiya M., Kaushik S., and Edna Elizabeth N. "Opportunistic routing to mitigate attacks in MANET." In 2014 Fourth International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2014. http://dx.doi.org/10.1109/icrtit.2014.6996116.
Pełny tekst źródłaRajakumar, P., Venkatesan T. Prasanna, and A. Pitchaikkannu. "Security attacks and detection schemes in MANET." In 2014 International Conference on Electronics and Communication Systems (ICECS). IEEE, 2014. http://dx.doi.org/10.1109/ecs.2014.6892808.
Pełny tekst źródłaBharti, Meena, Shaveta Rani, and Paramjeet Singh. "Security Attacks in MANET: A Complete Analysis." In 2022 6th International Conference on Devices, Circuits and Systems (ICDCS). IEEE, 2022. http://dx.doi.org/10.1109/icdcs54290.2022.9780760.
Pełny tekst źródła