Search Result "attacks on nodes"


Research Article

FSM based Intrusion Detection of Packet Dropping Attack usingTrustworthy Watchdog Nodes

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 9 Year: 2021 Page: 2817-2827
Author(s): Radha Raman Chandan,P.K Mishra

Research Article

Hybrid Cryptography Algorithm for Securing Wireless Sensor Networks from Node Clone Attack

Journal: Recent Advances in Electrical & Electronic Engineering
Volume: 13 Issue: 2 Year: 2020 Page: 251-259
Author(s): Vandana Mohindru,Yashwant Singh,Ravindara Bhatt

Review Article

Conceptual Framework to Mitigate Internet of Things-DDoS Attacks Using Fog Nodes

Journal: Recent Patents on Engineering
Volume: 15 Issue: 4 Year: 2021 Page: 9-15
Author(s): B.B. Gupta,S.A. Harish

Research Article

A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks

Journal: Recent Patents on Engineering
Volume: 12 Issue: 1 Year: 2018 Page: 15-22
Author(s): T. Bhatia,A.K. Verma,G. Sharma,S. Bala

Overview of Attack Surfaces in Blockchain

Ebook: Blockchain Applications in Cybersecurity Solutions
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815080599123010007

General Research Article

Comparative Analysis of E-OLSR Algorithm in the Presence of Routing Attacks in MANET

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 8 Issue: 1 Year: 2018 Page: 65-71
Author(s): R. Bhuvaneswari,R. Ramachandran

A Survey on VANETs Security Attacks and Sybil Attack Detection

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 6 Issue: 1 Year: 2016 Page: 45-62
Author(s): Chaitanya Kumar Karn, Chandra Prakash Gupta

Research Article

History-Based Secure Routing Protocol to Detect Blackhole and Greyhole Attacks in Opportunistic Networks

Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 5 Issue: 2 Year: 2016 Page: 73-89
Author(s): Deepak Kr. Sharma,Sanjay K. Dhurandher,Isaac Woungang,Jatin Arora,Himshikha Gupta

Research Article

DRI Table Based Traffic-Behaviour Analysis Approach for Detection of Blackhole Attack

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 10 Issue: 1 Year: 2020 Page: 79-93
Author(s): Kapil Juneja

Smart Wireless Sensor Network to Detect and Protect Sheep and Goats to Wolf Attacks

Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 2 Issue: 2 Year: 2013 Page: 91-101
Author(s): Sandra Sendra,Ferran Llario,Lorena Parra,Jaime Lloret

Previous   Next

Go To   Results 1 - 1 of 1393

Apply Filters

Volume Years
Article Type
Publication Title
Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy