A survey of attacks in mobile ad hoc networks
暂无分享,去创建一个
[1] R. Santhosh Kumar,et al. DOS Attacks and Defenses at the Network Layer in AD-HOC and Sensor Wireless Networks, Wireless AD-HOC Sensor Networks: A Short Survey , 2015 .
[2] Dr. S. Karthik,et al. An Analysis of Various Attacks in MANET , 2014 .
[3] Chander Diwaker,et al. ATTACKS ON MOBILE AD-HOC NETWORKS , 2013 .
[4] Shadi Aljawarneh,et al. A Conceptual Security Framework for Cloud Computing Issues , 2016, Int. J. Intell. Inf. Technol..
[5] Shadi Aljawarneh,et al. Cloud security engineering: Early stages of SDLC , 2017, Future Gener. Comput. Syst..
[6] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[7] Pankaj Gupta,et al. Attacks Finding and Prevention Techniques in MANET: A Survey , 2015 .
[8] Kamalrulnizam Abu Bakar,et al. A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks , 2014, Frontiers of Computer Science.
[9] Shadi Aljawarneh,et al. A web engineering security methodology for e-learning systems , 2011, Netw. Secur..
[10] Yue Wu,et al. Security and trust management in opportunistic networks: a survey , 2015, Secur. Commun. Networks.
[11] Mohamed Rida,et al. A survey of intrusion detection systems for cloud computing environment , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[12] Sarvesh Tanwar. Threats & Security Issues in Ad hoc network: A Survey Report , 2013 .
[13] J. Godwin Ponsam,et al. A Survey on MANET Security Challenges, Attacks and its Countermeasures , 2014 .
[14] Ritu Chauhan,et al. Security Attacks In Mobile Adhoc Networks , 2012 .
[15] Shadi Aljawarneh,et al. A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.
[16] Peter J. B. King,et al. Dynamic source routing under attacks , 2015, 2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM).
[17] Farrukh Aslam Khan,et al. Analysis of Detection Features for Wormhole Attacks in MANETs , 2015, FNC/MobiSPC.
[18] Shadi Aljawarneh,et al. Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..
[19] Shadi Aljawarneh,et al. Cloud Security Engineering: Avoiding Security Threats the Right Way , 2011, Int. J. Cloud Appl. Comput..
[20] D. N. Goswami,et al. An analysis of Security Attacks found in Mobile Ad-hoc Network , 2014 .
[21] Mayank Singhal,et al. Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET) , 2013 .
[22] Swapnesh Taterh,et al. A Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture , 2014, SocProS.
[23] Gaurav Kumar Tak,et al. Comparative Analysis of Various Attacks on MANET , 2015 .
[24] Sanjeev Thakur,et al. Vulnerabilities, Challenges and Threats in Securing Mobile Ad-Hoc Network , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[25] Ibrihich Ouafaa,et al. An advanced analysis on secure hierarchical routing protocols in wireless sensor network , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[26] Noureldien A. Noureldien,et al. A novel taxonomy of MANET attacks , 2015, 2015 International Conference on Electrical and Information Technologies (ICEIT).
[27] K. Nirmala,et al. Security Challenges in Mobile Ad Hoc Networks - A Survey , 2016 .
[28] P. Rajakumar,et al. Security attacks and detection schemes in MANET , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).