Artykuły w czasopismach na temat „Passive attacks in MANET”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Passive attacks in MANET”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Sah, Raja Ram, Devendra Kumar Sahu, Nanda Satish Kulkarni, K. Venkata Ramana, Shikha Maheshwari, and Nagarjuna E. "OPTIMIZING MANET PERFORMANCE WITH IMPROVISED ALGORITHMIC INNOVATIONS FOR ENHANCED CONNECTIVITY AND SECURITY." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3195–99. http://dx.doi.org/10.21917/ijct.2024.0476.
Pełny tekst źródłaNigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.
Pełny tekst źródłaHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Pełny tekst źródłaKumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.
Pełny tekst źródłaM S, Usha, and K. C. Ravishankar Dr. "KEY DISTRIBUTION APPROACH TO MITIGATE PASSIVE ATTACKS IN MANET." Indian Journal of Computer Science and Engineering 11, no. 6 (2020): 819–24. http://dx.doi.org/10.21817/indjcse/2020/v11i6/201106111.
Pełny tekst źródłaTuan, Chiu Ching, Kuen Yang Chen, and Yi Chao Wu. "Preventive Security Mechanism Based on AODV." Advanced Materials Research 225-226 (April 2011): 565–68. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.565.
Pełny tekst źródłaBalla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.
Pełny tekst źródłaA., Priyadharshini. "Mitigating Selfish Misbehavior Attack in MANET by SMD Algorithm." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 07 (2018): 424–27. https://doi.org/10.5281/zenodo.1320417.
Pełny tekst źródłaRaut, Deepali, and Kapil Hande. "Detection and Prevention of Gray Hole and Black Hole Attack in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 5029–38. http://dx.doi.org/10.24297/ijct.v13i9.2407.
Pełny tekst źródłaPrasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.
Pełny tekst źródłaPrasad, K. D. V., D. Palanikkumar, Dankan Gowda V., Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5s (2023): 188–98. http://dx.doi.org/10.17762/ijritcc.v11i5s.6643.
Pełny tekst źródłaLiang, Yingbin, H. Vincent Poor, and Lei Ying. "Secrecy Throughput of MANETs Under Passive and Active Attacks." IEEE Transactions on Information Theory 57, no. 10 (2011): 6692–702. http://dx.doi.org/10.1109/tit.2011.2165800.
Pełny tekst źródłaLalli, M., and J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.
Pełny tekst źródła., Mohd Faisal. "ATTACKS IN MANET." International Journal of Research in Engineering and Technology 02, no. 10 (2013): 273–76. http://dx.doi.org/10.15623/ijret.2013.0210040.
Pełny tekst źródłaNabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.
Pełny tekst źródłaGhodichor, Nitesh, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, and Ankush Sawarkar. "Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET." International journal of Computer Networks & Communications 15, no. 2 (2023): 127–46. http://dx.doi.org/10.5121/ijcnc.2023.15207.
Pełny tekst źródłaDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Pełny tekst źródłaSandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.
Pełny tekst źródłaSharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.
Pełny tekst źródłaArudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.
Pełny tekst źródłaV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Pełny tekst źródłaDeeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.
Pełny tekst źródłaChen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Pełny tekst źródłaAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Pełny tekst źródłaKakkar, Parveen, Pooja Sharma, and Krishan Saluja. "Vulnerability Assessment of Routing Protocols in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 11 (2018): 285–91. https://doi.org/10.5281/zenodo.1489366.
Pełny tekst źródłaJain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.
Pełny tekst źródłaShrivastava, Neha, and Anand Motwani. "Survey of Malicious Attacks in MANET." International Journal of Computer Applications 80, no. 14 (2013): 28–30. http://dx.doi.org/10.5120/13931-1916.
Pełny tekst źródłaArora, Jasleen, Paramjeet Singh, and Shaveta Rani. "Detecting and Preventing Attacks in MANET." International Journal of Computer Applications 81, no. 5 (2013): 14–18. http://dx.doi.org/10.5120/14007-2056.
Pełny tekst źródłaHemalatha, S., Harikumar Pallathadka, Rajesh P. Chinhewadi, D. Kalaiyarasi, and B. Anni Princy. "Challenges on Missing Packet Detection or Packet Dropping Attacks in Mobile Adhoc Network -A Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 676–80. http://dx.doi.org/10.17762/ijritcc.v11i8s.7255.
Pełny tekst źródłaA.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.
Pełny tekst źródłaPunya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.
Pełny tekst źródłaBaba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Pełny tekst źródłaSuganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.
Pełny tekst źródłaSafdar Malik, Tauqeer, Muhammad Nasir Siddiqui, Muhammad Mateen, Kaleem Razzaq Malik, Song Sun, and Junhao Wen. "Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring." Security and Communication Networks 2022 (April 29, 2022): 1–18. http://dx.doi.org/10.1155/2022/4943218.
Pełny tekst źródłaHarpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.
Pełny tekst źródłaVijayan, P., Dr P. Anbalagan, and Dr S. Selvakumar. "An Ensembled Optimization Algorithm for Secured and Energy Efficient Low Latency MANET with Intrusion Detection." Journal of Internet Services and Information Security 12, no. 4 (2022): 156–63. http://dx.doi.org/10.58346/jisis.2022.i4.011.
Pełny tekst źródłaMurugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.
Pełny tekst źródłaBegum, Shifana. "An Efficient & Secure Timer Based baiting Approach to Detect Black Hole Attacks in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (2020): 29–32. http://dx.doi.org/10.46501/ijmtst060607.
Pełny tekst źródłaG, Jeeva, and Selvaraj K. "INVESTIGATION OF POTENTIAL MULTIPLE THREATS AND THEIR IMPACTS IN MANET." ICTACT Journal on Communication Technology 12, no. 2 (2021): 2407–13. http://dx.doi.org/10.21917/ijct.2021.0356.
Pełny tekst źródłaDrishya, Sr, and Vaidehi Vijayakumar. "A REVIEW ON SECURITY ENHANCEMENT THROUGH ANONYMOUS ROUTING IN MANET." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 166. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19629.
Pełny tekst źródłaYassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.
Pełny tekst źródłaPal, Arunangshu, and Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph." Mapana - Journal of Sciences 11, no. 4 (2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Pełny tekst źródłaAhamad, Tariq, and Abdullah Aljumah. "Preventive mechanism against DDoS attacks in MANET." International Journal of ADVANCED AND APPLIED SCIENCES 4, no. 5 (2017): 94–100. http://dx.doi.org/10.21833/ijaas.2017.05.017.
Pełny tekst źródłaChahal, Pooja, Gaurav Kumar Tak, and Anurag Singh Tomar. "Comparative Analysis of Various Attacks on MANET." International Journal of Computer Applications 111, no. 12 (2015): 42–46. http://dx.doi.org/10.5120/19594-1383.
Pełny tekst źródłaZhao, Ziming, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu. "Risk-Aware Mitigation for MANET Routing Attacks." IEEE Transactions on Dependable and Secure Computing 9, no. 2 (2012): 250–60. http://dx.doi.org/10.1109/tdsc.2011.51.
Pełny tekst źródłaSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Pełny tekst źródłaKumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.
Pełny tekst źródłaJatmika, Andy Hidayat, I. Made Windra Yudistiana, and Ariyan Zubaidi. "Analisis Optimasi Kinerja Protokol Routing AODV dan AOMDV dengan Menggunakan Metode RFAP untuk Mencegah RREQ Flooding Attacks pada Jaringan MANET." Jurnal Teknologi Informasi, Komputer, dan Aplikasinya (JTIKA ) 1, no. 1 (2019): 9–18. http://dx.doi.org/10.29303/jtika.v1i1.13.
Pełny tekst źródłaRam Mohan, Ch, and Venugopal Reddy Ananthula. "Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization." International Journal of Modeling, Simulation, and Scientific Computing 10, no. 03 (2019): 1950014. http://dx.doi.org/10.1142/s1793962319500144.
Pełny tekst źródłaBabu, M. Rajesh, S. Moses Dian, Siva Chelladurai, and Mathiyalagan Palaniappan. "Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/715820.
Pełny tekst źródła