A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability
Abstract Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless network
in which the mobile nodes operate in a distributed manner and collaborate with each other …
in which the mobile nodes operate in a distributed manner and collaborate with each other …
A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network
Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless networking field
in which the movables nodes operates in distributed manner and collaborates with each …
in which the movables nodes operates in distributed manner and collaborates with each …
An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network
G Rajeshkumar, KR Valluvan - Wireless Personal Communications, 2017 - Springer
Today modern and innovative applications for health care environment based on Wireless
Sensor Network (WSN) are being developed in the commercial sector. The emerging sensor …
Sensor Network (WSN) are being developed in the commercial sector. The emerging sensor …
A hybrid efficient distributed clustering algorithm based intrusion detection system to enhance security in MANET
MANET plays a key role in the contemporary improvements in technology and services that
dynamically builds up the network connection bringing about a variation in network …
dynamically builds up the network connection bringing about a variation in network …
[PDF][PDF] International journal of advanced research in computer science and software engineering
AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
Remote sensing-based statistical approach for defining drained lake basins in a continuous Permafrost region, North Slope of Alaska
Lake formation and drainage are pervasive phenomena in permafrost regions. Drained lake
basins (DLBs) are often the most common landforms in lowland permafrost regions in the …
basins (DLBs) are often the most common landforms in lowland permafrost regions in the …
Fine-grained analysis of packet loss in MANETs
Most existing trust-based security schemes for mobile ad-hoc networks (MANETs) consider
packet loss an indicator of possible attacks by malicious nodes. There may be several …
packet loss an indicator of possible attacks by malicious nodes. There may be several …
Opportunistic mobile networks
As children, many of us were glued to the science fiction stories in comic books or television
shows. Arguably, computer-generated imagery (CGI) in the recent sci-fi shows or movies …
shows. Arguably, computer-generated imagery (CGI) in the recent sci-fi shows or movies …
Implementation of A3ACKs intrusion detection system under various mobility speeds
A Basabaa, T Sheltami, E Shakshuki - Procedia Computer Science, 2014 - Elsevier
Wireless networking is an emerging technology that allows users to access information and
services anywhere regardless of their geographic location. Mobile Ad hoc Network …
services anywhere regardless of their geographic location. Mobile Ad hoc Network …
Performance analysis of on-demand routing protocol for MANET using EA3ACK algorithm
K Thamizhmaran, M Anitha… - International Journal of …, 2017 - inderscienceonline.com
Mobile ad-hoc networks (MANETs) do not have a fixed infrastructure. Every single node in
the MANET works as both receiver and transmitter. Each node directly communicates with …
the MANET works as both receiver and transmitter. Each node directly communicates with …