Gotowa bibliografia na temat „MANET attacks”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „MANET attacks”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "MANET attacks"

1

Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.

Pełny tekst źródła
Streszczenie:
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. This paper presents the enhanced attack trees for MANET attacks, which is completed by extending the basic attack trees. The enhanced attack trees add the types between nodes and the attributes of nodes. Finally this paper shows how to represent the Block hole attacks in MANETs by means of the enhanced attack trees.
Style APA, Harvard, Vancouver, ISO itp.
2

Sandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.

Pełny tekst źródła
Streszczenie:
An ordinary, self-orbiting communication network with the ability to manage mobile nodes is called a mobile ad-hoc network (MANET). The vulnerability of the MANET to various threats and attacks is addressed by numerous proposed protocols. The malicious node takes advantage of these weaknesses to launch attacks, such as wormhole attacks, particularly when nodes are mobile and the network's topology is unstable. The termite method for detecting wormhole attacks in MANETs is presented in this research. Keywords: MANET, Denial of service, Wormhole attack, Termite approach
Style APA, Harvard, Vancouver, ISO itp.
3

Ancy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.

Pełny tekst źródła
Streszczenie:
MANET is the mobile ad-hoc network. Security is very important especially when transmitting the data packets from one node to another. MANET is constructed by grouping mobile wireless nodes with no fixed infrastructure. In order to forward the packets, all the nodes in the network must cooperate with each other, so that the nodes beyond the radio ranges can communicate. Each node acts as a router and MANET is infrastructure-less networks. Hence, MANET is open to more security attacks such as Gray-hole attack, Black-hole attack and worm-hole attack. Due to the dynamism in network topology, MANE
Style APA, Harvard, Vancouver, ISO itp.
4

V, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.

Pełny tekst źródła
Streszczenie:
In this research paper, we discussed the guaranteed reliable communication between nodes by constructing the black hole attack free route in MANET. To achieve this, a Hybrid Intrusion Detection System (HIDS) technique has been proposed to detect and remove the black hole attack nodes in the routing path. In MANETs, a novel cluster leader election process has been proposed. This election process is based on the node with maximum energy level. One of the important functionality is security in MANET. Due to many different attacks in the routing path, MANET becomes unsecure. Understanding the form
Style APA, Harvard, Vancouver, ISO itp.
5

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Pełny tekst źródła
Streszczenie:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attac
Style APA, Harvard, Vancouver, ISO itp.
6

Dr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.

Pełny tekst źródła
Streszczenie:
A mobile adhoc network (MANET) is a type of network, which contains number of mobile devices with wireless network interconnections. In MANET, each node can act as transmitter, router and data sink. MANET has dynamic topology which allows nodes to join and leave the adhoc network at any point of time. MANETs are more vulnerable than wired networks due to its characteristics like dynamic topology, distributed cooperation and open medium. Security issues in mobile adhoc networks are veiled by various techniques that were introduced in past decade. Due to decentralized nature of MANET, the securi
Style APA, Harvard, Vancouver, ISO itp.
7

M. Shivashankar, Et al. "Evading and Averting the Sybil Attack in Manets Using Mac Hash Message Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1160–66. http://dx.doi.org/10.17762/ijritcc.v11i9.9025.

Pełny tekst źródła
Streszczenie:
The security loopholes present in the wireless network especially MANET makes it vulnerable and weak. Most of the users are much concerned about the very security of the network and hesitate to participate actively in the transactions. Very powerful and strange attacks are pinpointed by many research scholars in the past. The Sybil attack is one of the most detrimental attacks imparted on MANETS where plethora of authentic nodes are faked and forged to enable illegal entry into a network to disrupt the very security of the MANET. The Sybil attack acts and simulates like an existing node presen
Style APA, Harvard, Vancouver, ISO itp.
8

Murugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.

Pełny tekst źródła
Streszczenie:
Mobile Ad-hoc Networks (MANETs) are susceptible to various security threats due to their decentralized and dynamic nature. Among these threats, Distributed Denial of Service (DDoS) and sibling attacks pose significant challenges to the integrity and availability of network services. This paper presents a novel approach for securing MANETs against DDoS and sibling attacks through a robust Intrusion Prevention System (IPS) integrated with a secured routing mechanism. The proposed methodology leverages residual transfer learning to adapt a pre-trained model for intrusion detection to the MANET en
Style APA, Harvard, Vancouver, ISO itp.
9

Kancharakuntla, Deepika, and Hosam El-Ocla. "EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks." Electronics 11, no. 21 (2022): 3480. http://dx.doi.org/10.3390/electronics11213480.

Pełny tekst źródła
Streszczenie:
The presence of malevolent nodes in mobile ad hoc networks (MANETs) would lead to genuine security concerns. These nodes may disturb the routing process or deform the pattern of the data packets passing through the network. The MANET is extremely liable to attacks, owing to its characteristics of the network framework, such as the absence of infrastructure, moveable topology, and a centralized control unit. One of the most common attacks in MANETs is the blackhole attack. MANET nodes are susceptible to spectacular degradation of network performance in the presence of such attacks. In this rega
Style APA, Harvard, Vancouver, ISO itp.
10

Yusri Dak, Ahmad, Noor Elaiza Abdul Khalid, and Saadiah Yahya. "Integrated Combined Layer Algorithm (ICLA) for Jamming Detection in MANET." International Journal of Engineering & Technology 7, no. 3.15 (2018): 24. http://dx.doi.org/10.14419/ijet.v7i3.15.17400.

Pełny tekst źródła
Streszczenie:
The nature of MANETs such as open medium, dynamic mobility and lack of security makes it susceptible to a range of attacks. Jamming attacks is recorded as the highest occurring attacks that exist at physical and MAC layers in MANET. Therefore, an integrated combined layer algorithm (ICLA) is proposed using reverse engineering and anomaly detection technique. The methodology begins by collecting data through OPNET. Analysis and evaluation of the data produces three jammers detection Metrics which are used detect jammers. The performance of the outcome are then tested against other jammers’ mode
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "MANET attacks"

1

Vu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.

Pełny tekst źródła
Streszczenie:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of high demand in sharing streaming video and audio in various applications, one MANET could be setup quickly to facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that hav
Style APA, Harvard, Vancouver, ISO itp.
2

Alam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.

Pełny tekst źródła
Streszczenie:
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, disruption of the medium access control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks o
Style APA, Harvard, Vancouver, ISO itp.
3

Ur-Rehman, Shoaib, and Irshan Ullah. "Analysis of Black Hole attack on MANETs Using different MANET routing protocol." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1151.

Pełny tekst źródła
Streszczenie:
ABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communi
Style APA, Harvard, Vancouver, ISO itp.
4

ULLAH, IRSHAD, and SHOAIB UR REHMAN. "Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2505.

Pełny tekst źródła
Streszczenie:
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secu
Style APA, Harvard, Vancouver, ISO itp.
5

Silva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.

Pełny tekst źródła
Streszczenie:
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento
Style APA, Harvard, Vancouver, ISO itp.
6

Chang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.

Pełny tekst źródła
Streszczenie:
碩士<br>國立清華大學<br>資訊工程學系<br>95<br>Mobile ad hoc network (MANET) is a group of mobile wireless nodes that communicate with each other without the aid of the infrastructure such as base station. It has been used in many applications, for example, military application, personal electronic device, ad hoc meeting, etc. Because of the shortcoming of the routing protocol, MANET is vulnerable to some kinds of attacks. Black hole attack, gray hole attack, wormhole attack, traffic analysis attack, and rushing attack are common attacks in ad hoc network. In this thesis, we introduce a critical attack in MA
Style APA, Harvard, Vancouver, ISO itp.
7

Alnaghes, Mnar Saeed. "An Approach to Defend Against Black hole Attacks in Ad Hoc Networks: Node Clustering AODV Protocol (CAODV)." Thesis, 2015. http://hdl.handle.net/1828/6753.

Pełny tekst źródła
Streszczenie:
The flexibility of Mobile Ad hoc networks (MANET) and its characteristics introduce new security risks. One possible attack is the Black Hole attack which received recent attention. In the Black Hole attack, a malicious node uses the routing protocol to declare itself as having the shortest path to the node whose packets it wants to intercept. It is needed to understand this risk with a view to extract preventive and corrective protections against it. We introduce an approach that could stop this attack from happening in such a network by using an algorithm which controls the communications be
Style APA, Harvard, Vancouver, ISO itp.
8

Sai, Keerthi T. Divya. "Designing Solutions to Counter the Attacks in Mobile Ad hoc Networks." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5315.

Pełny tekst źródła
Streszczenie:
The open medium, dynamic topology and distributed operation in Mobile Ad hoc Networks (MANET) leads to high risks. Many solutions are proposed to protect a MANET from attacks, ranging from attack identification to prevention. Although these solutions reduce and avoid the attacks in a MANET, sometimes they identify many false attacks as real ones which may cause huge loss of resources. For example, a sudden route breakdown can cause delay in packet delivery; differentiating such a delay from the delay caused by an attacker is difficult. Further, an intelligent attacker could also cause fa
Style APA, Harvard, Vancouver, ISO itp.
9

Guo, Yinghua. "Defending MANETs against flooding attacks by detective measures." 2008. http://arrow.unisa.edu.au:8081/1959.8/45723.

Pełny tekst źródła
Streszczenie:
Mobile ad hoc networks (MANETs), due to their unique characteristics (e.g., unsecured wireless channel, dynamic mobility, absence of central supportive infrastructure and limited resources), are suffering from a wide range of security threats and attacks. Particularly, MANETs are susceptible to the Denial of Service (DoS) attack that aims to disrupt the network by consuming its resources. In MANETs, a special form of DoS attack has emerged recently as a potentially major threat: the flooding attack. This attack recruits multiple attack nodes to flood the MANET with overwhelming broadcast traff
Style APA, Harvard, Vancouver, ISO itp.
10

Hsu, Yu-Wei, and 許祐瑋. "A Study of Black Hole Attacks Prevention in MANETs." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/qqdchv.

Pełny tekst źródła
Streszczenie:
碩士<br>國立東華大學<br>資訊工程學系<br>102<br>Nowadays smart devices are becoming more popular and functions are getting more powerful. The most obvious example is our mobile phones, which are not only communication tools but also computing tools with multitasking. Coupled with network services provided by Internet service providers (ISPs), modern people’s dependency upon the Internet and smart devices continue to increase, and the benefits will be inestimable if the enormous resources can be integrated. However, services provided by different ISPs may not form a complete network. In an environment without
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "MANET attacks"

1

Amiri, Iraj Sadegh, Elahe Fazeldehkordi, and Oluwatobi Ayodeji Akanbi. Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET. Elsevier Science & Technology Books, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Amiri, Iraj Sadegh, Elahe Fazeldehkordi, and Oluwatobi Ayodeji Akanbi. Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET. Elsevier Science & Technology Books, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "MANET attacks"

1

Jha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Simpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Enneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Saab, Farah, and Mariette Awad. "Modeling Attacks on MANET Using an Incomplete Repeated Bayesian Game." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-11310-4_24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Balasubramani, S., S. K. Rani, and K. Suja Rajeswari. "Review on Security Attacks and Mechanism in VANET and MANET." In Advances in Intelligent Systems and Computing. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-2656-7_60.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Pani, Niroj Kumar, and Sarojananda Mishra. "Secure Hybrid Routing for MANET Resilient to Internal and External Attacks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_49.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Khan, Muhammad Saleem, Qasim Khan Jadoon, and Majid I. Khan. "A Comparative Performance Analysis of MANET Routing Protocols under Security Attacks." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47669-7_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ebinger, Peter, and Tobias Bucher. "Modelling and Analysis of Attacks on the MANET Routing in AODV." In Ad-Hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11814764_24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Chaba, Yogesh, Yudhvir Singh, Kanwar Preet Singh, and Prabha Rani. "Performance Modeling of MANET Routing Protocols with Multiple Mode Wormhole Attacks." In Information and Communication Technologies. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15766-0_78.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "MANET attacks"

1

Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

A, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Gupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Noureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Patel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Singh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Elakkiya M., Kaushik S., and Edna Elizabeth N. "Opportunistic routing to mitigate attacks in MANET." In 2014 Fourth International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2014. http://dx.doi.org/10.1109/icrtit.2014.6996116.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Rajakumar, P., Venkatesan T. Prasanna, and A. Pitchaikkannu. "Security attacks and detection schemes in MANET." In 2014 International Conference on Electronics and Communication Systems (ICECS). IEEE, 2014. http://dx.doi.org/10.1109/ecs.2014.6892808.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bharti, Meena, Shaveta Rani, and Paramjeet Singh. "Security Attacks in MANET: A Complete Analysis." In 2022 6th International Conference on Devices, Circuits and Systems (ICDCS). IEEE, 2022. http://dx.doi.org/10.1109/icdcs54290.2022.9780760.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!