Survey on Identifying Packet Misbehavior in Network Virtualization
暂无分享,去创建一个
[1] Ali Selamat,et al. A Survey on Malware and Malware Detection Systems , 2013 .
[2] Vijay Laxmi,et al. Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.
[3] Abhilasha Sharma,et al. Detection and Prevention from Black Hole attack in AODV protocol for MANET , 2012 .
[4] Gerald Paul,et al. Comparative performance of tabu search and simulated annealing heuristics for the quadratic assignment problem , 2010, Oper. Res. Lett..
[5] Dina Simunic,et al. Cooperative Gray Hole Attack Discovery and Elimination using Credit based Technique in MANET , 2014 .
[6] Ilango Krishnamurthi,et al. Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..
[7] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[8] Ning Liu,et al. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[9] Manju Khari,et al. Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network , 2011 .
[10] Mohit Jain,et al. The Intelligent Network , 1989, Springer Berlin Heidelberg.
[11] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[12] Andrew H. Sung,et al. Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.
[13] Chen Wei,et al. A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[14] Gurjot Singh Gaba,et al. Detection and Analysis of Black Hole Attack using IDS , 2016 .
[15] Samy S. A. Ghoniemy. Performance Analysis of Mobile Ad-Hoc Network Protocols Against Black Hole Attacks , 2013, Int. J. Comput. Vis. Image Process..
[16] S. M. H. Seyedkashi,et al. New Simulated Annealing Algorithm for Quadratic Assignment Problem , 2010 .
[17] Sukla Banerjee. Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .
[18] Marjan Kuchaki Rafsanjani,et al. Black Hole Attacks Detection by Invalid Ip Addresses in Mobile Ad Hoc Networks , 2014 .
[19] Ei Ei Khin,et al. Impact of Black Hole Attack on AODV Routing Protocol , 2014 .
[20] Ali Selamat,et al. A survey on malware propagation, analysis, and detection , 2013 .
[21] Muñoz-Arcentales José,et al. Virtual Desktop Deployment in Middle Education and Community Centers Using Low-Cost Hardware , 2013 .
[22] P. Komisarczuk,et al. Identification of Malicious Web Pages with Static Heuristics , 2008, 2008 Australasian Telecommunication Networks and Applications Conference.
[23] K. Hizbullah,et al. A Khattak Approach for Detection and Removal of Black and Gray Hole Attacks in Manet , 2016 .
[24] Jaydip Sen,et al. A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.
[25] Tzi-cker Chiueh,et al. Efficient and Automatic Instrumentation for Packed Binaries , 2009, ISA.
[26] Joe H. Chow,et al. A mechanism for detecting gray hole attacks on synchrophasor data , 2014, 2014 IEEE International Conference on Communications (ICC).
[27] Walid Dabbous,et al. Real attacks on virtual networks: Vivaldi out of tune , 2006, LSAD '06.
[28] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[29] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[30] M-Tech Student,et al. Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach , 2015 .
[31] Paolo Toth,et al. A heuristic algorithm for the symmetric and asymmetric vehicle routing problems with backhauls , 1999, Eur. J. Oper. Res..
[32] Raouf Boutaba,et al. Network virtualization: state of the art and research challenges , 2009, IEEE Communications Magazine.
[33] K Vishnu,et al. Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks , 2010 .
[34] K. Thangadurai,et al. Detection of Black Hole Attack in Mobile Ad-hoc Networks using Ant Colony Optimization – simulation Analysis , 2015 .
[35] Ani Taggu,et al. TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[36] Bohyung Han,et al. Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[37] Chundong She,et al. Intrusion Detection for Black Hole and Gray Hole in MANETs , 2013, KSII Trans. Internet Inf. Syst..
[38] Yiming Li,et al. Software defined networking: State of the art and research challenges , 2014, Comput. Networks.
[39] Mojtaba Alizadeh,et al. Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .
[40] Sajal K. Das,et al. Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.
[41] Ramjee Prasad,et al. A Mechanism for Gray Hole Attack Detection in Mobile Ad–hoc Networks , 2012 .
[42] Rashmi Singh,et al. Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review , 2013 .
[43] Jyoti Singhai,et al. DETECTION AND ISOLATION OF RELUCTANT NODES USING REPUTATION BASED SCHEME IN AN AD-HOC NETWORK , 2011 .
[44] Subrat Kar,et al. BAAP: Blackhole attack avoidance protocol for wireless network , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[45] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[46] D. Simunic,et al. Technique for Detection of Cooperative Black Hole Attack in Mobile Ad-hoc Networks-Survey , 2014 .
[47] Geoffrey C. Fox,et al. Analysis of Virtualization Technologies for High Performance Computing Environments , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[48] Li-Der Chou,et al. A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.
[49] Sandeep Kumar Arora,et al. Combined Approach for the Analysis of Black Hole and Worm Hole Attack in MANET , 2016 .
[50] Tsuhan Chen,et al. Malicious web content detection by machine learning , 2010, Expert Syst. Appl..
[51] Chinyao Low,et al. Heuristic solutions to multi-depot location-routing problems , 2002, Comput. Oper. Res..
[52] Tanupreet Singh,et al. A Secured Data Transmission Method using Enhanced Proactive Secret Sharing Scheme to Prevent Blackhole Attack in Manets- A Review , 2015 .