Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Novel Solution to Handle DDOS Attack in MANET"
written by Meghna Chhabra, Brij Gupta, Ammar Almomani,
published by Journal of Information Security, Vol.4 No.3, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] A survey on emerging security issues, challenges, and solutions for Internet of things (IoTs)
Advances in Malware and Data-Driven …, 2022
[2] Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future …
International Journal on Semantic Web and …, 2022
[3] Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System
Nawasrah, A Almomani… - Journal of Web …, 2022
[4] Deep-Learning and Machine-Learning-Based Techniques for Malware Detection and Data-Driven Network Security
Advances in Malware and Data …, 2022
[5] Edge Computing-Based DDoS Attack Detection for Intelligent Transportation Systems
Cyber Security, Privacy and Networking, 2022
[6] The Era of Advanced Machine Learning and Deep Learning Algorithms for Malware Detection
Advances in Malware …, 2022
[7] Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach
Advances in Malware and Data …, 2022
[8] Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers
Computers & Electrical …, 2022
[9] Deep reinforcement learning for optimal denial-of-service attacks scheduling
Science China Information Sciences, 2022
[10] Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures
2021
[11] A big data and deep learning based approach for ddos detection in cloud computing environment
2021 IEEE 10th Global …, 2021
[12] An improved agent protection model for distributed denial of service flooding attack traffics
2021
[13] Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks
International Conference on …, 2021
[14] Entropy-based DDoS Attack Detection in Cluster-based Mobile Ad Hoc Networks.
Adhoc & Sensor Wireless Networks, 2021
[15] An Auction-Based Incentivized Solution Against DDoS Attacks
2021
[16] CNA Tactics and Techniques: A Structure Proposal
2021
[17] Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
2021
[18] A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic
Neural Computing and …, 2021
[19] BB Gupta
Int. J. Innovative Computing and Applications, 2021
[20] Detecção de DDoS por aprendizado de máquina
2021
[21] A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack
2020
[22] An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
2020
[23] Designing interconnected haptic interfaces and actuators for teleoperations in mobile ad hoc networks
2020
[24] Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection
2020
[25] A Survey on Security in VANETs
2020
[26] A deep learning based HTTP slow DoS classification approach using flow data
2020
[27] A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
2020
[28] Perbandingan Kinerja Protokol ZRP (Zone Routing Protocol) dan HWMP (Hybrid Wireless Mesh Protocol) pada MANET (Mobile Ad hoc Network)
2020
[29] A lightweight Anomaly based DDoS flood attack detection for Internet of vehicles
2020
[30] Taxonomy of Payment Structures and Economic Incentive Schemes in Internet
2020
[31] The detection method of low-rate DoS attack based on multi-feature fusion
2020
[32] Cloud Computing Security: Taxonomy of Issues, Challenges, Case Studies, and Solutions
2020
[33] Factors Encouraging and Deterring Illegal Computer Hacking: Replicating and Extending Young and Zhang's Treatise on Illegal Computer Hacking
2019
[34] Machine learning for computer and cyber security: principle, algorithms, and practices
2019
[35] Performance Analysis of Network Intrusion Detection System using Machine Learning
International Journal of Advanced Computer Science and Applications, 2019
[36] Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices
2019
[37] Designing an Internet of Things Attack Simulator
2019
[38] AN ENERGY EFFICIENT V-LEACH ROUTING PROTOCOL IN WSN USING OPTIMIZATION TECHNIQUE
2019
[39] Simulation of an Enhanced Network Security Framework for Federal Polytechnic Mubi
2019
[40] Smart Card Security: Applications, Attacks, and Countermeasures
2019
[41] Security in the internet of things: recent challenges and solutions
2019
[42] Machine Learning for Computer and Cyber Security
2019
[43] aODV routing protocol using Dynamic trust handshake-based Malicious Behavior Detection
2019
[44] Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
2019
[45] Comparative study of intrusion detection system using machine learning
2019
[46] Analisis Perbandingan Kinerja Protokol AOMDV, DSDV, Dan ZRP
2018
[47] Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk
2018
[48] A Review on Information Security Program Development and Management
2018
[49] Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices
International Journal of E-Services and Mobile Applications (IJESMA), 2018
[50] SECURITY METHODS AGAINST TCP SYN FLOODING DDOS ATTACKS IN WIRELESS NETWORKS-A SURVEY
2018
[51] An efficient DDoS detection based on SU-Genetic feature selection
Cluster Computing, 2018
[52] Anomaly Detection in Networks Using Machine Learning
2018
[53] Security methods against tcp syn flooding ddos attacks in wireless networksa survey
2018
[54] Assessment of Honeypots: Issues, Challenges and Future Directions
International Journal of Cloud Applications and Computing (IJCAC), 2018
[55] Implementation of a personal area network for secure routing in MANETs by using low-cost hardware
2017
[56] Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
Arabian Journal for Science and Engineering, 2017
[57] Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks
Cluster Computing, 2017
[58] Security in Internet of Things: issues, challenges, taxonomy, and architecture
Telecommunication Systems, 2017
[59] Mitigate denial of service attacks in mobile ad-hoc networks
2017
[60] Secure Routing-Solution to Diminish DOS Attack in AODV Based MANET
2017
[61] Fighting against phishing attacks: state of the art and future challenges
Neural Computing and Applications, 2016
[62] Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
Neural Computing and Applications, 2016
[63] Trust or reputation base encryption decryption technique for preventing network from DOS attack in MANET
2016
[64] Toward Securing MANET Against the Energy Depletion Attack
International Conference on Risks and Security of Internet and Systems, 2015
[65] Proposed Method to Enhance the Performance of AOMDV under DDOS Attack
2015
[66] Improved EAACK scheme for detection and isolation of a malicious node in MANET
2015
[67] Proposed Method to Enhance the Performance of AOMDV under DDOS Attack.
International Journal of Security & Its Applications, 2015
[68] Security Mechanism for Mitigation of Flooding Attack under Group Mobility Model in MANET.
International Journal of Applied Engineering Research, 2015
[69] A Review on Mobile Ad-hoc Networks (MANET'S) with Attacks Impact
Imperial Journal of Interdisciplinary Research, 2015
[70] A modified algorithm to improve security and performance of AODV protocol against black hole attack
Wireless Networks, 2015
[71] A Survey on Discovery of Distributed Denial of Service Attacks in Cloud
International Journal of Computer Science Issues (IJCSI), 2015
[72] Implementation of personal area network for secure routing in MANET by using low cost hardware
2015
[73] EVALUASI KINERJA PROTOKOL AOMDV TERHADAP SERANGAN RUSHING DAN FLOODING PADA MANET DENGAN MENGGUNAKAN NETWORK SIMULATOR 2 (NS-2)
TRANSIENT, 2015
[74] EVALUASI KINERJA PROTOKOL AOMDV TERHADAP SERANGAN RUSHING DAN FLOODING PADA MANET DENGAN MENGGUNAKAN NETWORK SIMULATOR …
2015
[75] A Novel Approach on Sat Kaman Protocol to Prevent DOS Attack in MANET
2015
[76] A Novel Technique to Detect & Prevent Black & Gray Hole Attacks in Manet using TVRI Approach
2015
[77] A review on mobile ad-hoc network (MANETs) with Attacks and Impact
2015
[78] A review on mobile ad-hoc network MANETs with Attacks and Impact
2015
[79] An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET)
Research Journal of Applied Sciences, Engineering and Technology, 2014
[80] A Modified AODV-Mechanism to Prevent Root Request Flooding Attack in Mobile Adhoc Networks
EN Mohil, MK Dhankhar - ijritcc.org, 2014
[81] A survey of the mitigation methods against DoS attacks on MANETs
Science and Information Conference (SAI), 2014. IEEE, 2014
[82] Energy Attentive Multicast Routing Protocol for MANETs
[83] Analysis of Deep learning models for Recognition and Interpretation of Indian Sign
[84] Advancement of Cloud Computing and Big Data Analytics in Healthcare Sector Security
[85] Analysis of Machine Learning Based DDoS Attack Detection Techniques in Software Defined Network
[86] A Novel Ddos Attack Detection Framework for Software-Defined Iot (Sd-Iot) Networks Using Machine Learning
[87] IoT Security using Machine Learning Techniques
[88] Cyber Security Traits of a Future-Ready Organization
[89] Analysis of Machine learning based XSS attack Detection Techniques
[90] Top 50 Cyber Security Tools for IT and Business Professionals in 2022
[91] Analisis Perbandingan Kinerja Protokol AOMDV, DSDV, Dan ZRP Sebagai Protokol Routing Pada Mobile Ad-Hoc Network (MANET)
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top