Gotowa bibliografia na temat „Passive attacks in MANET”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Passive attacks in MANET”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Passive attacks in MANET"
Sah, Raja Ram, Devendra Kumar Sahu, Nanda Satish Kulkarni, K. Venkata Ramana, Shikha Maheshwari, and Nagarjuna E. "OPTIMIZING MANET PERFORMANCE WITH IMPROVISED ALGORITHMIC INNOVATIONS FOR ENHANCED CONNECTIVITY AND SECURITY." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3195–99. http://dx.doi.org/10.21917/ijct.2024.0476.
Pełny tekst źródłaNigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.
Pełny tekst źródłaHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Pełny tekst źródłaKumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.
Pełny tekst źródłaM S, Usha, and K. C. Ravishankar Dr. "KEY DISTRIBUTION APPROACH TO MITIGATE PASSIVE ATTACKS IN MANET." Indian Journal of Computer Science and Engineering 11, no. 6 (2020): 819–24. http://dx.doi.org/10.21817/indjcse/2020/v11i6/201106111.
Pełny tekst źródłaTuan, Chiu Ching, Kuen Yang Chen, and Yi Chao Wu. "Preventive Security Mechanism Based on AODV." Advanced Materials Research 225-226 (April 2011): 565–68. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.565.
Pełny tekst źródłaBalla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.
Pełny tekst źródłaA., Priyadharshini. "Mitigating Selfish Misbehavior Attack in MANET by SMD Algorithm." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 07 (2018): 424–27. https://doi.org/10.5281/zenodo.1320417.
Pełny tekst źródłaRaut, Deepali, and Kapil Hande. "Detection and Prevention of Gray Hole and Black Hole Attack in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 5029–38. http://dx.doi.org/10.24297/ijct.v13i9.2407.
Pełny tekst źródłaPrasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.
Pełny tekst źródłaRozprawy doktorskie na temat "Passive attacks in MANET"
Vu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.
Pełny tekst źródłaAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Pełny tekst źródłaSchellenberg, Falk [Verfasser], Christof [Gutachter] Paar, and Daniel [Gutachter] Holcomb. "Novel methods of passive and active side-channel attacks / Falk Schellenberg ; Gutachter: Christof Paar, Daniel Holcomb ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1175204986/34.
Pełny tekst źródłaSilva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.
Pełny tekst źródłaDjervbrant, Karl-Johan, and Andreas Häggström. "A Study on Fingerprinting of Locally Assigned MAC-Addresses." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-39749.
Pełny tekst źródłaGomina, Kamil. "Méthodologie et développement de solutions pour la sécurisation des circuits numériques face aux attaques en tensions." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0751.
Pełny tekst źródłaChang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.
Pełny tekst źródłaWright, Matthew K. "Passive logging attacks against anonymous communications systems." 2005. https://scholarworks.umass.edu/dissertations/AAI3179934.
Pełny tekst źródłaAlnaghes, Mnar Saeed. "An Approach to Defend Against Black hole Attacks in Ad Hoc Networks: Node Clustering AODV Protocol (CAODV)." Thesis, 2015. http://hdl.handle.net/1828/6753.
Pełny tekst źródłaChu-Ting, Teng, and 鄧竹庭. "It is a coincidental arrangement! Feint and response in planned passive attacks in Taekwondo sparring." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36tbj3.
Pełny tekst źródłaKsiążki na temat "Passive attacks in MANET"
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks. No Starch Press, 2005.
Znajdź pełny tekst źródłaSandler, Todd. Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/wentk/9780190845841.001.0001.
Pełny tekst źródłaPrusin, Alexander. “Serbia Is Quiet,” 1942–1944. University of Illinois Press, 2018. http://dx.doi.org/10.5406/illinois/9780252041068.003.0008.
Pełny tekst źródłaLeng, Thomas. Fellowship and Freedom. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198794479.001.0001.
Pełny tekst źródłaBartley, Abel A. Keeping the Faith. Greenwood Publishing Group, Inc., 2000. http://dx.doi.org/10.5040/9798400675553.
Pełny tekst źródłaOrtbals, Candice, and Lori Poloni-Staudinger. How Gender Intersects With Political Violence and Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190228637.013.308.
Pełny tekst źródłaCzęści książek na temat "Passive attacks in MANET"
Eid, Marwa M., and Noha A. Hikal. "Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58669-0_23.
Pełny tekst źródłaGuha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. "Bypassing Passive Attacks." In Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0_5.
Pełny tekst źródłaJha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.
Pełny tekst źródłaSardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Pełny tekst źródłaSimpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.
Pełny tekst źródłaMacFarland, Douglas C., Craig A. Shue, and Andrew J. Kalafut. "Characterizing Optimal DNS Amplification Attacks and Effective Mitigation." In Passive and Active Measurement. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15509-8_2.
Pełny tekst źródłaEnneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.
Pełny tekst źródłaHendriks, Luuk, Ricardo de Oliveira Schmidt, Roland van Rijswijk-Deij, and Aiko Pras. "On the Potential of IPv6 Open Resolvers for DDoS Attacks." In Passive and Active Measurement. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54328-4_2.
Pełny tekst źródłaNosyk, Yevheniya, Maciej Korczyński, and Andrzej Duda. "Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks." In Passive and Active Measurement. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98785-5_28.
Pełny tekst źródłaKopp, Daniel, Christoph Dietzel, and Oliver Hohlfeld. "DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks." In Passive and Active Measurement. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72582-2_17.
Pełny tekst źródłaStreszczenia konferencji na temat "Passive attacks in MANET"
Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.
Pełny tekst źródłaZhang, Yanan, Huan Huang, Hongliang Zhang, et al. "Disco Intelligent Omni-Surface Based Fully-Passive Jamming Attacks." In 2024 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2024. http://dx.doi.org/10.1109/iccc62479.2024.10682037.
Pełny tekst źródłaA, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.
Pełny tekst źródłaGupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.
Pełny tekst źródłaNoureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.
Pełny tekst źródłaPatel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.
Pełny tekst źródłaChawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.
Pełny tekst źródłaSingh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.
Pełny tekst źródłaElakkiya M., Kaushik S., and Edna Elizabeth N. "Opportunistic routing to mitigate attacks in MANET." In 2014 Fourth International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2014. http://dx.doi.org/10.1109/icrtit.2014.6996116.
Pełny tekst źródłaRajakumar, P., Venkatesan T. Prasanna, and A. Pitchaikkannu. "Security attacks and detection schemes in MANET." In 2014 International Conference on Electronics and Communication Systems (ICECS). IEEE, 2014. http://dx.doi.org/10.1109/ecs.2014.6892808.
Pełny tekst źródłaRaporty organizacyjne na temat "Passive attacks in MANET"
Tayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2132.
Pełny tekst źródła