ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks
KSII Transactions on Internet and Information Systems
◽
10.3837/tiis.2015.11.025
◽
2015
◽
Vol 9
(11)
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Route Request
Download Full-text
Related Documents
Cited By
References
Security model based mobile agent for mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
◽
10.1504/ijcnds.2019.096525
◽
2019
◽
Vol 22
(1)
◽
pp. 36
Author(s):
Maqbol Ahmed
◽
Kazar Okba
◽
Barkat Abdelbasset
◽
Bali Mouadh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Mobile Agent
◽
Ad Hoc
◽
Security Model
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Security model based mobile agent for mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
◽
10.1504/ijcnds.2019.10016923
◽
2019
◽
Vol 22
(1)
◽
pp. 36
Author(s):
Barkat Abdelbasset
◽
Kazar Okba
◽
Maqbol Ahmed
◽
Bali Mouadh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Mobile Agent
◽
Ad Hoc
◽
Security Model
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Trust Based Security Model to Withstand Against Black Hole and Grey Hole Attacks In Military Based Mobile Ad Hoc Networks
International Journal of Mobile Network Communications & Telematics
◽
10.5121/ijmnct.2016.6101
◽
2016
◽
Vol 6
(1)
◽
pp. 1-14
◽
Cited By ~ 1
Author(s):
Sivagurunathan S
◽
Prathapchandran K
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
New route request mechanism for energy optimization in mobile ad hoc networks
2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers
◽
10.1109/telfor.2011.6143533
◽
2011
◽
Cited By ~ 1
Author(s):
Mohamed Bouhorma
◽
Anouar Boudhir
◽
Mohamed Ben Ahmed
◽
Said El Brak
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Energy Optimization
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Route Request
Download Full-text
A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study
IEEE Transactions on Vehicular Technology
◽
10.1109/tvt.2008.923666
◽
2009
◽
Vol 58
(1)
◽
pp. 398-408
◽
Cited By ~ 29
Author(s):
Bo Rong
◽
Hsiao-Hwa Chen
◽
Yi Qian
◽
Kejie Lu
◽
Rose Qingyang Hu
◽
...
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Key Management
◽
Large Scale
◽
Ad Hoc
◽
Security Model
◽
Management Study
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Model Based Adaptive Mobility Prediction in Mobile Ad-Hoc Networks
2007 International Conference on Wireless Communications, Networking and Mobile Computing
◽
10.1109/wicom.2007.431
◽
2007
◽
Cited By ~ 8
Author(s):
S. M. Mousavi
◽
H. R. Rabiee
◽
M. Moshref
◽
A. Dabirmoghaddam
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobility Prediction
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Mobility Aware Distributed Topology Control in Mobile Ad-Hoc Networks with Model Based Adaptive Mobility Prediction
Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007)
◽
10.1109/wimob.2007.4390880
◽
2007
◽
Cited By ~ 7
Author(s):
S. M. Mousavi
◽
H. R. Rabiee
◽
M. Moshref
◽
A. Dabirmoghaddam
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Topology Control
◽
Ad Hoc
◽
Mobility Prediction
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Model-Based Reinforcement Learning Algorithm for Routing in Energy Harvesting Mobile Ad-Hoc Networks
Wireless Personal Communications
◽
10.1007/s11277-017-3987-8
◽
2017
◽
Vol 95
(3)
◽
pp. 3119-3139
◽
Cited By ~ 2
Author(s):
Meisam Maleki
◽
Vesal Hakami
◽
Mehdi Dehghan
Keyword(s):
Reinforcement Learning
◽
Energy Harvesting
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Learning Algorithm
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Reinforcement Learning Algorithm
Download Full-text
Security model for routing attacks in mobile ad hoc networks
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
◽
10.1109/vetecf.2003.1285399
◽
2003
◽
Cited By ~ 5
Author(s):
S.P. Alampalayam
◽
A. Kumar
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Routing Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A cluster based security model for mobile ad hoc networks
2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005.
◽
10.1109/icpwc.2005.1431377
◽
2005
◽
Author(s):
J. Chandra
◽
L.L. Singh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close