Gotowa bibliografia na temat „Passive attacks in MANET”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Passive attacks in MANET”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Passive attacks in MANET"

1

Sah, Raja Ram, Devendra Kumar Sahu, Nanda Satish Kulkarni, K. Venkata Ramana, Shikha Maheshwari, and Nagarjuna E. "OPTIMIZING MANET PERFORMANCE WITH IMPROVISED ALGORITHMIC INNOVATIONS FOR ENHANCED CONNECTIVITY AND SECURITY." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3195–99. http://dx.doi.org/10.21917/ijct.2024.0476.

Pełny tekst źródła
Streszczenie:
Mobile Ad-hoc Networks (MANETs) face significant challenges in maintaining connectivity and security due to their dynamic and decentralized nature. Passive attacks, such as eavesdropping and traffic analysis, pose a critical threat to MANET. This study proposes a novel algorithm, Radial ResNet, tailored for the classification of passive attacks in MANETs. The algorithm integrates radial basis function networks with residual networks (ResNet) to enhance classification accuracy and efficiency. Experimental results demonstrate the effectiveness of Radial ResNet, achieving an average classificatio
Style APA, Harvard, Vancouver, ISO itp.
2

Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.

Pełny tekst źródła
Streszczenie:
Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, we focus on Black Hole attack in Mobile adhoc networks. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing att
Style APA, Harvard, Vancouver, ISO itp.
3

Hikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.

Pełny tekst źródła
Streszczenie:
Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in M
Style APA, Harvard, Vancouver, ISO itp.
4

Kumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.

Pełny tekst źródła
Streszczenie:
A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission atte
Style APA, Harvard, Vancouver, ISO itp.
5

M S, Usha, and K. C. Ravishankar Dr. "KEY DISTRIBUTION APPROACH TO MITIGATE PASSIVE ATTACKS IN MANET." Indian Journal of Computer Science and Engineering 11, no. 6 (2020): 819–24. http://dx.doi.org/10.21817/indjcse/2020/v11i6/201106111.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Tuan, Chiu Ching, Kuen Yang Chen, and Yi Chao Wu. "Preventive Security Mechanism Based on AODV." Advanced Materials Research 225-226 (April 2011): 565–68. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.565.

Pełny tekst źródła
Streszczenie:
In a mobile ad-hoc network, MANET, designing a security routing protocol is an important issue since the mobile nodes and wireless medium are prone to be attacked. However, most of wireless routing protocols concentrated on how to reduce the data transmission time and energy consumption. Wireless routing paths in MANET may be broken or fabricated by attacking. Hence, sending data packets to the destination may failure. For defending the active black hole attacks and the passive fabricated routing attacks, we proposed a preventive security mechanism based on ad-hoc on-demand distance vector rou
Style APA, Harvard, Vancouver, ISO itp.
7

Balla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.

Pełny tekst źródła
Streszczenie:
MANET is one of self configuring fastest emerging wireless technology. MANET is multi-hop wireless network of autonomous mobile nodes with no preset infrastructure where each node can move in any direction as well play a role of router. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among pair of nodes. Therefore many proactive, reactive & hybrid routing protocols have been proposed, among which one of well known is AODV due to its high performance gain. Cooperative nature of nodes exposes MANET to various kinds of passive &amp
Style APA, Harvard, Vancouver, ISO itp.
8

A., Priyadharshini. "Mitigating Selfish Misbehavior Attack in MANET by SMD Algorithm." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 07 (2018): 424–27. https://doi.org/10.5281/zenodo.1320417.

Pełny tekst źródła
Streszczenie:
MANET is a self-organized and decentralized wireless network, which is widely used in military applications, game parties, conferencing, etc. Due to its dynamic topology MANET is highly exposed to wide variety of attackers. Selfish misbehavior in channel allocation is a type of passive attack that affects the data link layer which will harm the network severely. As selfish misbehavior is a passive attack it is very difficult to detect. In this paper, Selfish Misbehavior Detection (SMD) algorithm is proposed that detects the selfish misbehavior during channel utilization. The mechanism uses clu
Style APA, Harvard, Vancouver, ISO itp.
9

Raut, Deepali, and Kapil Hande. "Detection and Prevention of Gray Hole and Black Hole Attack in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 5029–38. http://dx.doi.org/10.24297/ijct.v13i9.2407.

Pełny tekst źródła
Streszczenie:
An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination.
Style APA, Harvard, Vancouver, ISO itp.
10

Prasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.

Pełny tekst źródła
Streszczenie:
Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore sus
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Passive attacks in MANET"

1

Vu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.

Pełny tekst źródła
Streszczenie:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of high demand in sharing streaming video and audio in various applications, one MANET could be setup quickly to facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that hav
Style APA, Harvard, Vancouver, ISO itp.
2

Alam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.

Pełny tekst źródła
Streszczenie:
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, disruption of the medium access control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks o
Style APA, Harvard, Vancouver, ISO itp.
3

Schellenberg, Falk [Verfasser], Christof [Gutachter] Paar, and Daniel [Gutachter] Holcomb. "Novel methods of passive and active side-channel attacks / Falk Schellenberg ; Gutachter: Christof Paar, Daniel Holcomb ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1175204986/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Silva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.

Pełny tekst źródła
Streszczenie:
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento
Style APA, Harvard, Vancouver, ISO itp.
5

Djervbrant, Karl-Johan, and Andreas Häggström. "A Study on Fingerprinting of Locally Assigned MAC-Addresses." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-39749.

Pełny tekst źródła
Streszczenie:
The number of WiFi Devices is increasing every day, most people traveling hasa device with a WiFi network card enabled. This is something EffectSoft AB in Halmstad utilizes in their service Flow, to track and count devices. The accuracy of counted devices was however not accurate enough for a commercial use and this is where this candidate Thesis will continue research on how to improve the accuracy. It introduces the fundamental problem on how one cannot directly count transmitted MAC-Addresses to count present devices, since the manufacturers implement features against this such as MAC-Addre
Style APA, Harvard, Vancouver, ISO itp.
6

Gomina, Kamil. "Méthodologie et développement de solutions pour la sécurisation des circuits numériques face aux attaques en tensions." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0751.

Pełny tekst źródła
Streszczenie:
Les applications grand public comme la téléphonie mobile ou les cartes bancaires manipulent des données confidentielles. A ce titre, les circuits qui les composent font de plus en plus l'objet d'attaques qui présentent des menaces pour la sécurité des données. Les concepteurs de systèmes sur puce (SoC) doivent donc proposer des solutions sécurisées, tout en limitant le coût et la complexité globale des applications. L’analyse des attaques existantes sur les circuits numériques nous a orienté vers celles se basant sur la tension d'alimentation, dans des nœuds technologiques avancés.Dans un prem
Style APA, Harvard, Vancouver, ISO itp.
7

Chang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.

Pełny tekst źródła
Streszczenie:
碩士<br>國立清華大學<br>資訊工程學系<br>95<br>Mobile ad hoc network (MANET) is a group of mobile wireless nodes that communicate with each other without the aid of the infrastructure such as base station. It has been used in many applications, for example, military application, personal electronic device, ad hoc meeting, etc. Because of the shortcoming of the routing protocol, MANET is vulnerable to some kinds of attacks. Black hole attack, gray hole attack, wormhole attack, traffic analysis attack, and rushing attack are common attacks in ad hoc network. In this thesis, we introduce a critical attack in MA
Style APA, Harvard, Vancouver, ISO itp.
8

Wright, Matthew K. "Passive logging attacks against anonymous communications systems." 2005. https://scholarworks.umass.edu/dissertations/AAI3179934.

Pełny tekst źródła
Streszczenie:
Anonymous communications protocols have been designed to resist attacks that work in a short period of time. However, people typically use the Internet in regular, consistent ways over long periods of time, and consequently they are vulnerable to losing their privacy over the lifetime of those communications. Our work has focused on long-term attacks against anonymous communications systems. The predecessor attack is an example of this kind of attack; the attacker logs the connections of a user over time, eventually linking the connections to the user's machine. In this thesis, we give a proof
Style APA, Harvard, Vancouver, ISO itp.
9

Alnaghes, Mnar Saeed. "An Approach to Defend Against Black hole Attacks in Ad Hoc Networks: Node Clustering AODV Protocol (CAODV)." Thesis, 2015. http://hdl.handle.net/1828/6753.

Pełny tekst źródła
Streszczenie:
The flexibility of Mobile Ad hoc networks (MANET) and its characteristics introduce new security risks. One possible attack is the Black Hole attack which received recent attention. In the Black Hole attack, a malicious node uses the routing protocol to declare itself as having the shortest path to the node whose packets it wants to intercept. It is needed to understand this risk with a view to extract preventive and corrective protections against it. We introduce an approach that could stop this attack from happening in such a network by using an algorithm which controls the communications be
Style APA, Harvard, Vancouver, ISO itp.
10

Chu-Ting, Teng, and 鄧竹庭. "It is a coincidental arrangement! Feint and response in planned passive attacks in Taekwondo sparring." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36tbj3.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣師範大學<br>運動科學研究所<br>102<br>In Taekwondo sparring, active and passive attacks are continuously running every moment. Though the frequency of active attacks was increased after the rules change, so was the rate of point loss in active attacks. However, the rate of point loss in passive attack was relatively reduced. Among the various tactics of passive attack, the planned passive attacks that induced the attacks of the opponents with a feint were more successful than the responding passive attacks. Therefore, the purpose of the study was to examine the relation between the effective pla
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Passive attacks in MANET"

1

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks. No Starch Press, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Sandler, Todd. Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/wentk/9780190845841.001.0001.

Pełny tekst źródła
Streszczenie:
The causes and consequences of terrorism are matters of considerable debate and great interest. Spectacular events are recognized by their dates, including the 9/11 attacks in New York and Washington and the 7/7 London bombings. Many other attacks, including those in non-Western countries, receive far less attention even though they may be more frequent and cumulatively cause more casualties. In Terrorism: What Everyone Needs to KnowRG, leading economist Todd Sandler provides a broad overview of a persistently topical topic. The general issues he examines include what terrorism is, its causes,
Style APA, Harvard, Vancouver, ISO itp.
3

Prusin, Alexander. “Serbia Is Quiet,” 1942–1944. University of Illinois Press, 2018. http://dx.doi.org/10.5406/illinois/9780252041068.003.0008.

Pełny tekst źródła
Streszczenie:
Examines the situation in Serbia in 1942-1944. After the defeat in the fall-winter 1941, the depleted Partisan forces in Serbia confined their actions to small-scale attacks and sabotage acts, while the Chetniks remained largely passive. It appeared, therefore, that small German contingents assisted by the Bulgarian and collaborationist forces would be able to keep the country in check. However, the Partisans gradually re-organized their depleted units into a large and effective force and ultimately emerged victorious. At the same time, the efforts to maintain a precarious balance between coll
Style APA, Harvard, Vancouver, ISO itp.
4

Leng, Thomas. Fellowship and Freedom. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198794479.001.0001.

Pełny tekst źródła
Streszczenie:
This is the first modern study of the Fellowship of Merchant Adventurers—sixteenth-century England’s premier trading company—in its final century of existence as a privileged organization. Over this period the company’s main trade, the export of cloth to northwest Europe, was overshadowed by rising traffic with the wider world, whilst its privileges were continually criticized in an era of political revolution. But the company and its membership were not passive victims of these changes; rather, they were active participants in the commercial and political dramas of the century. Using thousand
Style APA, Harvard, Vancouver, ISO itp.
5

Bartley, Abel A. Keeping the Faith. Greenwood Publishing Group, Inc., 2000. http://dx.doi.org/10.5040/9798400675553.

Pełny tekst źródła
Streszczenie:
An examination of the political and economic power of a large African American community in a segregated southern city; this study attacks the myth that blacks were passive victims of the southern Jim Crow system and reveals instead that in Jacksonville, Florida, blacks used political and economic pressure to improve their situation and force politicians to make moderate adjustments in the Jim Crow system. Bartley tells the compelling story of how African Americans first gained, then lost, then regained political representation in Jacksonville. Between the end of the Civil War and the consolid
Style APA, Harvard, Vancouver, ISO itp.
6

Ortbals, Candice, and Lori Poloni-Staudinger. How Gender Intersects With Political Violence and Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190228637.013.308.

Pełny tekst źródła
Streszczenie:
Gender influences political violence, which includes, for example, terrorism, genocide, and war. Gender uncovers how women, men, and nonbinary persons act according to feminine, masculine, or fluid expectations of men and women. A gendered interpretation of political violence recognizes that politics and states project masculine power and privilege, with the result that men occupy the dominant social position in politics and women and marginalized men are subordinate. As such, men (associated with masculinity) are typically understood as perpetrators of political violence with power and agency
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Passive attacks in MANET"

1

Eid, Marwa M., and Noha A. Hikal. "Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58669-0_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Guha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. "Bypassing Passive Attacks." In Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Jha, Harsh Nath, Samiran Gupta, and Debabrata Maity. "Effect of Wormhole Attacks on MANET." In Lecture Notes in Networks and Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9574-1_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Simpson, Serin V., and G. Nagarajan. "Security Challenges and Attacks in MANET-IoT Systems." In Enterprise Digital Transformation. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003119784-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

MacFarland, Douglas C., Craig A. Shue, and Andrew J. Kalafut. "Characterizing Optimal DNS Amplification Attacks and Effective Mitigation." In Passive and Active Measurement. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15509-8_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Enneya, Nourddine, Aziz Baayer, and Mohammed ElKoutbi. "A Dynamic Timestamp Discrepancy against Replay Attacks in MANET." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25483-3_40.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Hendriks, Luuk, Ricardo de Oliveira Schmidt, Roland van Rijswijk-Deij, and Aiko Pras. "On the Potential of IPv6 Open Resolvers for DDoS Attacks." In Passive and Active Measurement. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54328-4_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Nosyk, Yevheniya, Maciej Korczyński, and Andrzej Duda. "Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks." In Passive and Active Measurement. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98785-5_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kopp, Daniel, Christoph Dietzel, and Oliver Hohlfeld. "DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks." In Passive and Active Measurement. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72582-2_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Passive attacks in MANET"

1

Ahmed, Amjed Abbas, Saif Aamer Fadhil, Ali Hamza Najim, Khattab M. Ali Alheeti, Nurhizam Safie Mohd Satar, and Aisha Hassan Abdallah Hashim. "Assessing the Effects of Blackhole Attacks on MANET Reliability and Security." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836645.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Zhang, Yanan, Huan Huang, Hongliang Zhang, et al. "Disco Intelligent Omni-Surface Based Fully-Passive Jamming Attacks." In 2024 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2024. http://dx.doi.org/10.1109/iccc62479.2024.10682037.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

A, Deepak H., Pradeep Kumar S, Deepak R, and Keerthi Kumar M. "Detecting the Intrusion Attacks in MANET Using HGSO Based Feature Selection with Deep Recurrent Neural Network." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968724.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Gupta, Nitika, and Shailendra Narayan Singh. "Wormhole attacks in MANET." In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE, 2016. http://dx.doi.org/10.1109/confluence.2016.7508120.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Noureldien, Noureldien A. "A novel taxonomy of MANET attacks." In 2015 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2015. http://dx.doi.org/10.1109/eitech.2015.7162947.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Patel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033859.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chawhan, Manish Devendra, Shweta Rohankar, Nainika Kaware, et al. "Prevention of Jamming Attacks in MANET." In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). IEEE, 2023. http://dx.doi.org/10.1109/icetet-sip58143.2023.10151635.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Singh, Ram Kishore, and Parma Nand. "Literature review of routing attacks in MANET." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813776.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Elakkiya M., Kaushik S., and Edna Elizabeth N. "Opportunistic routing to mitigate attacks in MANET." In 2014 Fourth International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2014. http://dx.doi.org/10.1109/icrtit.2014.6996116.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Rajakumar, P., Venkatesan T. Prasanna, and A. Pitchaikkannu. "Security attacks and detection schemes in MANET." In 2014 International Conference on Electronics and Communication Systems (ICECS). IEEE, 2014. http://dx.doi.org/10.1109/ecs.2014.6892808.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Passive attacks in MANET"

1

Tayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2132.

Pełny tekst źródła
Streszczenie:
The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the netwo
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!