A secure model for prevention of black hole attack in wireless mobile ad hoc networks
暂无分享,去创建一个
Mazdak Zamani | Azizah Abdul Manaf | Shahidan M. Abdullah | Tanya Koohpayeh Araghi | Sagheb Kohpayeh Araghi | Hoda Soltanian Bojnord | M. Zamani | A. Manaf
[1] Mazdak Zamani,et al. A confidential RFID model to prevent unauthorized access , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).
[2] E. A. Mary Anita,et al. Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining , 2010 .
[3] Kun-Ming Yu,et al. A Distributed and Cooperative Algorithm for the Detection and Elimination of Multiple Black Hole Nodes in Ad Hoc Networks , 2009, IEICE Trans. Commun..
[4] Mazdak Zamani,et al. Redirecting outgoing DNS requests toward a fake DNS server in a LAN , 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences.
[5] Zhao Min,et al. Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.
[6] Honarbakhsh Shohreh,et al. Dynamic Monitoring in Ad Hoc Network , 2012 .
[7] Mazdak Zamani,et al. A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[8] Seyed Mostafa Mirhosseini,et al. A Survey on Methods to Defend against DDoS Attack in Cloud Computing , 2013 .
[9] Mazdak Zamani,et al. A trust based model for federated identity architecture to mitigate identity theft , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[10] Hossein Rouhani Zeidanloo,et al. A proposed framework for P2P botnet detection , 2010 .
[11] Hossein Rouhani Zeidanloo,et al. A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[12] Mazdak Zamani,et al. Improving the security of protected wireless internet access from insider attacks , 2012 .
[13] Mojtaba Alizadeh,et al. A Survey on Attacks in RFID Networks , 2012 .
[14] Huirong Fu,et al. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).
[15] Hossein Rouhani Zeidanloo,et al. Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.
[16] M. Zamani,et al. An Overview on Methods to Detect Port Scanning Attacks in Cloud Computing , 2013 .
[17] M. Janbeglou,et al. Redirecting network traffic toward a fake DNS server on a LAN , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[18] Mojtaba Alizadeh,et al. Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .
[19] Mazdak Zamani,et al. A survey on security issues of federated identity in the cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[20] M. Zamani,et al. Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance , 2012, 2012 IEEE Conference on Open Systems.
[21] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[22] Mazdak Zamani,et al. Development of a Web-Based Community Management Information System , 2011, 2011 Fourth International Conference on Information and Computing.