Hybrid cryptography for malicious behavior detection and prevention system for MANETs
SS Jathe, V Dhamdhere - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Wireless network is used very rapidly and widely. Being mobile used in many
fields.(MANET) Mobile ad hoc network is a standout amongst the most essential uses of …
fields.(MANET) Mobile ad hoc network is a standout amongst the most essential uses of …
A study on various attacks and detection methodologies in software defined networks
S Singh, SKV Jayakumar - Wireless Personal Communications, 2020 - Springer
Abstract The Software Defined Networks (SDN) is widely used in many industrial and
enterprise networking applications due to its flexibility and gaining popularity. It offers …
enterprise networking applications due to its flexibility and gaining popularity. It offers …
Secure route discovery in AODV in presence of blackhole attack
In recent years, there has been tremendous increase in mobile adhoc networks applications
ranging from military and rescue operations to collaborative and distributed computing …
ranging from military and rescue operations to collaborative and distributed computing …
Amalgamation of Transfer Learning and Explainable AI for Internet of Medical Things
R Murugan, M Paliwal… - Recent Advances in …, 2024 - ingentaconnect.com
The Internet of Medical Things (IoMT), a growing field, involves the interconnection of
medical devices and data sources. It connects smart devices with data and optimizes patient …
medical devices and data sources. It connects smart devices with data and optimizes patient …
CACK—A Counter Based Authenticated ACK to Mitigate Misbehaving Nodes from MANETs
C Atheeq, MMA Rabbani - Recent Advances in Computer …, 2021 - ingentaconnect.com
Background: The evolution of wireless network from wired network presents a worldwide
pattern in the previous couple of decades. All the mobile nodes in MANET act as router as …
pattern in the previous couple of decades. All the mobile nodes in MANET act as router as …
RETRACTED ARTICLE: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks
M Anbarasan, S Prakash, A Antonidoss… - Multimedia Tools and …, 2020 - Springer
Abstract MANET (Mobile Adhoc Networks) possess the open system condition, absence of
central server, mobile nodes that make helpless to security assault while conventional …
central server, mobile nodes that make helpless to security assault while conventional …
A comparative analysis of machine deep learning algorithms for intrusion detection in wsn
S Deshpande, J Gujarathi, P Chandre… - Security Issues and …, 2021 - Springer
The rapid growth of the Internet and information technologies and also the diminution of the
price of hardware components like wireless sensors leads to the fast growth in Wireless …
price of hardware components like wireless sensors leads to the fast growth in Wireless …
[PDF][PDF] Improved AODV routing protocol for mitigating effects of grayhole attack in VANET using genetic algorithm
G Kaur, MS Rani, TC Aseri - Int. J. Comput. Sci. Eng. Technol., 2015 - ijcset.net
Recent advancement in technology related to wireless communication has given rise to
VANET. VANET is the application of MANET that relies on vehicles for network functionality …
VANET. VANET is the application of MANET that relies on vehicles for network functionality …
Comprehensive study of various DoS attacks and defense approaches in MANETs
RH Jhaveri, AD Patel… - … Conference on Emerging …, 2012 - ieeexplore.ieee.org
A Mobile Ad-hoc Network (MANET) is an independent and self-configurable network without
any fixed infrastructure. Compared to traditional network, MANETs have unique …
any fixed infrastructure. Compared to traditional network, MANETs have unique …
基于元学习与强化学习的跨域自组织网络流量测量优化方法
宋健, 聂来森, 陶醉 - 水下无人系统学报, 2024 - sxwrxtxb.xml-journal.net
跨域自组织网络是一种将不同介质上的节点进行自组织, 网络拓扑自适应的网络.
在跨域通信网络中, 直接测量技术可获得准确的端到端网络流量信息. 但跨域网络中部分节点的 …
在跨域通信网络中, 直接测量技术可获得准确的端到端网络流量信息. 但跨域网络中部分节点的 …