ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A systematic comparison of mobile Ad-hoc network security attacks
Materials Today Proceedings
◽
10.1016/j.matpr.2020.12.617
◽
2021
◽
Author(s):
Salman Ali Syed
Keyword(s):
Network Security
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Security Attacks
◽
Systematic Comparison
◽
Mobile Ad Hoc
Download Full-text
Related Documents
Cited By
References
Constraints and Approaches for Distributed Mobile AD-HOC Network Security
10.21236/ada442043
◽
2005
◽
Author(s):
Patrick W. Fitzgibbons
◽
Digen Das
◽
Larry J. Hash
Keyword(s):
Network Security
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Mobile Ad Hoc
Download Full-text
A mobile ad hoc network security architecture based on immune agents
2010 Second International Conference on Communication Systems, Networks and Applications
◽
10.1109/iccsna.2010.5588880
◽
2010
◽
Author(s):
Li Jinlai
◽
Lu Xiangqing
◽
Gao Guohong
Keyword(s):
Network Security
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Security Architecture
◽
Mobile Ad Hoc
Download Full-text
Architecture of the mobile ad-hoc network security (MANS) system
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)
◽
10.1109/icsmc.2003.1244370
◽
2004
◽
Cited By ~ 6
Author(s):
C. Manikopoulos
◽
Li Ling
Keyword(s):
Network Security
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Mobile Ad Hoc
Download Full-text
Performance evaluation of Mobile Ad hoc Network routing protocols under various security attacks
2010 International Conference on Methods and Models in Computer Science (ICM2CS-2010)
◽
10.1109/icm2cs.2010.5706730
◽
2010
◽
Cited By ~ 3
Author(s):
Y Sharma
◽
A Sharma
◽
J Sengupta
Keyword(s):
Performance Evaluation
◽
Routing Protocols
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Network Routing
◽
Security Attacks
◽
Mobile Ad Hoc
Download Full-text
Mobile ad hoc network security - a taxonomy
10.1109/icact.2005.246082
◽
2005
◽
Cited By ~ 5
Author(s):
S. Alampalayam
◽
A. Kumar
◽
S. Srinivasan
Keyword(s):
Network Security
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Mobile Ad Hoc
Download Full-text
An Assessment of Mobile Ad-Hoc Network Security Threads: A Wormhole Attack
International Journal of Computer Applications
◽
10.5120/15092-3091
◽
2014
◽
Vol 85
(19)
◽
pp. 5-8
◽
Cited By ~ 1
Author(s):
Neha Sahu
◽
Deepak Singh Tomar
◽
Neelam Pathak
Keyword(s):
Network Security
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Wormhole Attack
◽
Mobile Ad Hoc
Download Full-text
Survey Paper on Various Security Attacks In Mobile Ad Hoc Network
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v6i1.156160
◽
2018
◽
Vol 6
(1)
◽
pp. 156-160
Author(s):
M. Selladevi
◽
◽
S. Duraisamy
◽
Keyword(s):
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Security Attacks
◽
Survey Paper
◽
Mobile Ad Hoc
Download Full-text
eBATMAN: An Emulator-BAsed Testbed for Studying Mobile Ad-Hoc Network Security
2010 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF)
◽
10.1109/rivf.2010.5632442
◽
2010
◽
Cited By ~ 1
Author(s):
Trung Nguyen
◽
Hoai-Nam Nguyen
◽
Yoichi Shinoda
Keyword(s):
Network Security
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Mobile Ad Hoc
Download Full-text
MOBILE AD HOC NETWORK AND VEHICULAR AD HOC NETWORK SECURITY
Security of Self-Organizing Networks
◽
10.1201/ebk1439819197-8
◽
2010
◽
pp. 124-124
Keyword(s):
Network Security
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Vehicular Ad Hoc Network
◽
Mobile Ad Hoc
Download Full-text
Mobile Ad Hoc Network Security for Reactive Routing Protocol with Node Reputation Scheme
Journal of Computer Science
◽
10.3844/jcssp.2011.242.249
◽
2011
◽
Vol 7
(2)
◽
pp. 242-249
◽
Cited By ~ 3
Author(s):
Suresh
Keyword(s):
Network Security
◽
Routing Protocol
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Reactive Routing
◽
Mobile Ad Hoc
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close