Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Malicious node detection"

ADD TO MY LIST
 
COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS

Author(s): SUNIL K. PARYANI, | RAJESH PATEL, | VIJAY UKANI
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC NETWORKS

Author(s): Debdutta Barman Roy | Rituparna Chaki | Nabendu Chaki
Trust Based Routing for Misbehavior Detection in Ad Hoc Networks

Author(s): Wei Gong | Zhiyang You | Danning Chen | Xibin Zhao | Ming Gu | Kwok-Yan Lam
A Novel Distributed Detection Scheme against DDoS Attack

Author(s): Zaihong Zhou | Dongqing Xie | Wei Xiong
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs

Author(s): Mauro Conti | Roberto Di Pietro | Luigi V. Mancini | Alessandro Mei
A Power Model for Intrusion Detection and Defense System in Ad Hoc Network

Author(s): S.V. Sonekar | N.A. Mohota | V.D. Rughwani | S.B. Tiwaskar | V.P.Choudhari
Malicious Node Detection System for Mobile Ad hoc Networks

Author(s): Rajaram.A | Dr. S. Palaniswami
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method

Author(s): Satoshi Kurosawa | Hidehisa Nakayama | Nei Kato | Abbas Jamalipour | Yoshiaki Nemoto
Sybil Nodes Detection Based on Received Signal Strength Variations within VANET

Author(s): Mohamed Salah Bouassida | Gilles Guette | Mohamed Shawky | Bertrand Ducourthial
A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks

Author(s): K.P.Manikandan | Dr.R.Satyaprasad | Dr.K.Rajasekhararao
A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks

Author(s): Meghdadi Majid | Ozdemir Suat | G├╝ler Inan
Performance Analysis of Intrusion Detection in MANET

Author(s): Rohit Sharma | SAMRIDHI SHARMA
Application Based Detection Technique for Secure Mobile Ad-hoc Network

Author(s): Kamini Maheshwar | Sapna Bagde | Deshraj Ahirwar
Black Hole Detection in MANET Using AODV Routing Protocol

Author(s): Govind Sharma | Manish Gupta
A Novel Security Framework Using Trust And Fuzzy Logic In Manet

Author(s): Manoj V | Mohammed Aaqib | Raghavendiran N | Vijayan R
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs

Author(s): Conti Mauro | Di Pietro Roberto | Mancini LuigiV | Mei Alessandro
MADSN: Mobile Agent Based Detection of Selfish Node in MANET

Author(s): Debdutta Barman Roy | Rituparna Chaki
Grayhole Attack and Prevention in Mobile Adhoc Network

Author(s): Megha Arya | Yogendra Kumar Jain
Why do you need a reservation system?      Save time & money - Smart Internet Solutions