Detection and Prevention of Vampire Attack for MANET
暂无分享,去创建一个
[1] Jyoti Yadav,et al. Intrusion Detection System using Data Mining , 2015 .
[2] Pinyaphat Tasatanattakool,et al. Blockchain: Challenges and applications , 2018, 2018 International Conference on Information Networking (ICOIN).
[3] N. Geethanjali,et al. A Resilient Strategy to Overcome Stretch Attacks by using Kmidpoint - Medoid Gateway Clustering Algorithm , 2017, 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC).
[4] Zouheir Trabelsi,et al. Edu-firewall device: An advanced firewall hardware device for information security education , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[5] Rakesh Verma,et al. Detection of Vampire Attack in Wireless Ad- hoc Network , 2015 .
[6] Khaled Shuaib,et al. Introducing blockchains for healthcare , 2017, 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA).
[7] Saleha I. Saudagar,et al. Secure VANET from vampire attack using LEACH protocol , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).
[8] Brijendra Kumar Joshi,et al. Detection & prevention of vampire attack in wireless sensor networks , 2017, 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC).
[9] TP Anithaashri,et al. Security Enhancement for Wireless Network Communication , 2018, 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI).
[10] Bharat Pahadiya,et al. Detection and Removal of Vampire Attack in Wireless Sensor Network , 2015 .
[11] Bikash Kanti Sarkar,et al. Big data for secure healthcare system: a conceptual design , 2017 .
[12] Abhay Kumar,et al. A Survey Paper on Blockchain Technology, Challenges and Opportunities , 2019, International Journal of Computer Trends & Technology.
[13] Yan Wang,et al. A survey on security and privacy issues of blockchain technology , 2018, Math. Found. Comput..
[14] Nicholas Hopper,et al. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[15] Ning Cao,et al. A Novel Approach to Improve Robustness of Data Mining Models Used in Cyber Security Applications , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[16] Vrushali Kulkarni,et al. Blockchain and Its Applications – A Detailed Survey , 2017 .
[17] S. Sreenivasa Chakravarthi,et al. A Review on Intrusion Detection Techniques and Intrusion Detection Systems in MANETs , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.
[18] Sung-Bong Jang,et al. A Survey of Blockchain and Its Applications , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
[19] Hossain Shahriar,et al. Web Application Firewall: Network Security Models and Configuration , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[20] G. Premalatha,et al. Depletion of vampire attacks in medium access control level using interior gateway routing protocol , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).