Search Result "malicious node"
Malicious Route Detection in Vehicular Ad-hoc Network using Geographic Routing with Masked Data
Journal: Recent Advances in Computer Science and Communications
Volume: 13 Issue: 3 Year: 2020 Page: 319-325
Author(s): Saravanan Palani,Logesh Ravi,Vijayakumar Varadarajan,Subramaniyaswamy Vairavasundaram,Xiao-Zhi Gao
Malicious apps Identification in Android Devices Using Machine Learning Algorithms
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 10 Issue: 4 Year: 2020 Page: 559-569
Author(s): Ravinder Ahuja,Vineet Maheshwari,Siddhant Manglik,Abiha Kazmi,Rishika Arora,Anuradha Gupta
ANN Based Malicious IoT-BoT Traffic Detection in IoT Network
Ebook: Intelligent Technologies for Research and Engineering
Volume: 3 Year: 2024
Author(s): M. Philip Austin,J. Zahariya Gabrie
Doi: 10.2174/9789815196269124030012
FSM based Intrusion Detection of Packet Dropping Attack usingTrustworthy Watchdog Nodes
Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 9 Year: 2021 Page: 2817-2827
Author(s): Radha Raman Chandan,P.K Mishra
CACKâA Counter Based Authenticated ACK to Mitigate Misbehaving Nodes from MANETs
Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 3 Year: 2021 Page: 837-847
Author(s): C. Atheeq,M. Munir A. Rabbani
Conceptual Framework to Mitigate Internet of Things-DDoS Attacks Using Fog Nodes
Journal: Recent Patents on Engineering
Volume: 15 Issue: 4 Year: 2021 Page: 9-15
Author(s): B.B. Gupta,S.A. Harish
Effect of Quarantine and Recovery on Infectious Nodes in Wireless Sensor Network
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 8 Issue: 1 Year: 2018 Page: 26-36
Author(s): Pramod K. Srivastava,Rudra P. Ojha,Kavita Sharma,Shashank Awasthi,Goutam Sanyal
Learning Framework for Joint Optimal Node Placement and ResourceManagement in Dynamic Fog Environment
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 14 Issue: 2 Year: 2024 Page: 144-160
Author(s): S. M. Dilip Kumar
History-Based Secure Routing Protocol to Detect Blackhole and Greyhole Attacks in Opportunistic Networks
Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 5 Issue: 2 Year: 2016 Page: 73-89
Author(s): Deepak Kr. Sharma,Sanjay K. Dhurandher,Isaac Woungang,Jatin Arora,Himshikha Gupta
Modeling of Random Selfish Behavior Attack Using Single-Sided Laplacian Distribution and Performance Evaluation for High Security Communications in Mobile Ad-hoc Networks
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 11 Issue: 4 Year: 2021 Page: 458-471
Author(s): Kirti A. Adoni,Anil S. Tavildar,Krishna K. Warhade