Detection and Prevention of Vampire Attack for MANET

[1]  Jyoti Yadav,et al.  Intrusion Detection System using Data Mining , 2015 .

[2]  Pinyaphat Tasatanattakool,et al.  Blockchain: Challenges and applications , 2018, 2018 International Conference on Information Networking (ICOIN).

[3]  N. Geethanjali,et al.  A Resilient Strategy to Overcome Stretch Attacks by using Kmidpoint - Medoid Gateway Clustering Algorithm , 2017, 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC).

[4]  Zouheir Trabelsi,et al.  Edu-firewall device: An advanced firewall hardware device for information security education , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[5]  Rakesh Verma,et al.  Detection of Vampire Attack in Wireless Ad- hoc Network , 2015 .

[6]  Khaled Shuaib,et al.  Introducing blockchains for healthcare , 2017, 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA).

[7]  Saleha I. Saudagar,et al.  Secure VANET from vampire attack using LEACH protocol , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).

[8]  Brijendra Kumar Joshi,et al.  Detection & prevention of vampire attack in wireless sensor networks , 2017, 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC).

[9]  TP Anithaashri,et al.  Security Enhancement for Wireless Network Communication , 2018, 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI).

[10]  Bharat Pahadiya,et al.  Detection and Removal of Vampire Attack in Wireless Sensor Network , 2015 .

[11]  Bikash Kanti Sarkar,et al.  Big data for secure healthcare system: a conceptual design , 2017 .

[12]  Abhay Kumar,et al.  A Survey Paper on Blockchain Technology, Challenges and Opportunities , 2019, International Journal of Computer Trends & Technology.

[13]  Yan Wang,et al.  A survey on security and privacy issues of blockchain technology , 2018, Math. Found. Comput..

[14]  Nicholas Hopper,et al.  Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.

[15]  Ning Cao,et al.  A Novel Approach to Improve Robustness of Data Mining Models Used in Cyber Security Applications , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[16]  Vrushali Kulkarni,et al.  Blockchain and Its Applications – A Detailed Survey , 2017 .

[17]  S. Sreenivasa Chakravarthi,et al.  A Review on Intrusion Detection Techniques and Intrusion Detection Systems in MANETs , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[18]  Sung-Bong Jang,et al.  A Survey of Blockchain and Its Applications , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).

[19]  Hossain Shahriar,et al.  Web Application Firewall: Network Security Models and Configuration , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[20]  G. Premalatha,et al.  Depletion of vampire attacks in medium access control level using interior gateway routing protocol , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).