Search Result "malicious node"


Research Article

Malicious Route Detection in Vehicular Ad-hoc Network using Geographic Routing with Masked Data

Journal: Recent Advances in Computer Science and Communications
Volume: 13 Issue: 3 Year: 2020 Page: 319-325
Author(s): Saravanan Palani,Logesh Ravi,Vijayakumar Varadarajan,Subramaniyaswamy Vairavasundaram,Xiao-Zhi Gao

Research Article

Malicious apps Identification in Android Devices Using Machine Learning Algorithms

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 10 Issue: 4 Year: 2020 Page: 559-569
Author(s): Ravinder Ahuja,Vineet Maheshwari,Siddhant Manglik,Abiha Kazmi,Rishika Arora,Anuradha Gupta

ANN Based Malicious IoT-BoT Traffic Detection in IoT Network

Ebook: Intelligent Technologies for Research and Engineering
Volume: 3 Year: 2024
Author(s): M. Philip Austin,J. Zahariya Gabrie
Doi: 10.2174/9789815196269124030012

Research Article

FSM based Intrusion Detection of Packet Dropping Attack usingTrustworthy Watchdog Nodes

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 9 Year: 2021 Page: 2817-2827
Author(s): Radha Raman Chandan,P.K Mishra

Research Article

CACK—A Counter Based Authenticated ACK to Mitigate Misbehaving Nodes from MANETs

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 3 Year: 2021 Page: 837-847
Author(s): C. Atheeq,M. Munir A. Rabbani

Review Article

Conceptual Framework to Mitigate Internet of Things-DDoS Attacks Using Fog Nodes

Journal: Recent Patents on Engineering
Volume: 15 Issue: 4 Year: 2021 Page: 9-15
Author(s): B.B. Gupta,S.A. Harish

Research Article

Effect of Quarantine and Recovery on Infectious Nodes in Wireless Sensor Network

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 8 Issue: 1 Year: 2018 Page: 26-36
Author(s): Pramod K. Srivastava,Rudra P. Ojha,Kavita Sharma,Shashank Awasthi,Goutam Sanyal

Research Article

Learning Framework for Joint Optimal Node Placement and ResourceManagement in Dynamic Fog Environment

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 14 Issue: 2 Year: 2024 Page: 144-160
Author(s): S. M. Dilip Kumar

Research Article

History-Based Secure Routing Protocol to Detect Blackhole and Greyhole Attacks in Opportunistic Networks

Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 5 Issue: 2 Year: 2016 Page: 73-89
Author(s): Deepak Kr. Sharma,Sanjay K. Dhurandher,Isaac Woungang,Jatin Arora,Himshikha Gupta

Research Article

Modeling of Random Selfish Behavior Attack Using Single-Sided Laplacian Distribution and Performance Evaluation for High Security Communications in Mobile Ad-hoc Networks

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 11 Issue: 4 Year: 2021 Page: 458-471
Author(s): Kirti A. Adoni,Anil S. Tavildar,Krishna K. Warhade

Previous   Next

Go To   Results 1 - 1 of 109

Apply Filters

Volume Years
Article Type
Publication Title
Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy