ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Prevention of Flooding Attacks in Mobile Ad Hoc Networks
Lecture Notes on Data Engineering and Communications Technologies - 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication
◽
10.1007/978-3-030-11437-4_15
◽
2019
◽
pp. 193-201
Author(s):
Gurjinder Kaur
◽
V. K. Jain
◽
Yogesh Chaba
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Related Documents
Cited By
References
Experimental Evaluation of Flooding Attacks in Mobile Ad Hoc Networks
2009 IEEE International Conference on Communications Workshops
◽
10.1109/iccw.2009.5208014
◽
2009
◽
Cited By ~ 1
Author(s):
P. Yi
◽
Y. Wu
◽
J. Ma
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Experimental Evaluation
◽
Ad Hoc
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Detect DDoS flooding attacks in mobile ad hoc networks
International Journal of Security and Networks
◽
10.1504/ijsn.2010.037666
◽
2010
◽
Vol 5
(4)
◽
pp. 259
◽
Cited By ~ 16
Author(s):
Yinghua Guo
◽
Sylvie Perreau
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Prevention of flooding attacks in mobile ad hoc networks
Proceedings of the International Conference on Advances in Computing, Communication and Control - ICAC3 '09
◽
10.1145/1523103.1523207
◽
2009
◽
Cited By ~ 5
Author(s):
Revathi Venkataraman
◽
M. Pushpalatha
◽
Rishav Khemka
◽
T. Rama Rao
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks
2007 IEEE Wireless Communications and Networking Conference
◽
10.1109/wcnc.2007.574
◽
2007
◽
Cited By ~ 10
Author(s):
Yinghua Guo
◽
Steven Gordon
◽
Sylvie Perreau
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Mechanism
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks
Information Networking. Advances in Data Communications and Wireless Networks - Lecture Notes in Computer Science
◽
10.1007/11919568_33
◽
2006
◽
pp. 327-336
◽
Cited By ~ 9
Author(s):
Zhi Ang Eu
◽
Winston Khoon Guan Seah
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Route Request
Start Chat
Download Full-text
Review on the Flooding Attacks in Mobile Ad Hoc Networks
International Journal of Advanced Research in Computer Science and Software Engineering
◽
10.23956/ijarcsse/v7i4/0218
◽
2017
◽
Vol 7
(4)
◽
pp. 390-392
◽
Cited By ~ 2
Author(s):
Jasmeen Mangat
◽
◽
Jaspreet Kaur
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Performance analysis of mobile ad hoc networks under flooding attacks
Journal of Systems Engineering and Electronics
◽
10.3969/j.issn.1004-4132.2011.02.022
◽
2011
◽
Vol 22
(2)
◽
pp. 334-339
◽
Cited By ~ 6
Author(s):
Ping Yi
◽
Futai Zou
◽
Van Zou
◽
Zhiyang Wang
Keyword(s):
Performance Analysis
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
Wireless Personal Communications
◽
10.1007/s11277-019-06166-8
◽
2019
◽
Vol 106
(2)
◽
pp. 365-376
◽
Cited By ~ 5
Author(s):
Payam Mohammadi
◽
Ali Ghaffari
Keyword(s):
Statistical Analysis
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks
Journal of Information Processing Systems
◽
10.3745/jips.2011.7.1.137
◽
2011
◽
Vol 7
(1)
◽
pp. 137-150
◽
Cited By ~ 8
Author(s):
Hyo-Jin Kim
◽
Ramachandra Bhargav Chitti
◽
Joo-Seok Song
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Processing Technique
◽
Packet Processing
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications
The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007)
◽
10.1109/auswireless.2007.46
◽
2007
◽
Cited By ~ 8
Author(s):
Venkat Balakrishnan
◽
Vijay Varadharajan
◽
Uday Tupakula
◽
Marie Elisabeth Gaup Moe
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Anonymous Communications
◽
Flooding Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close