Security Mechanism for MANETs
Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastr...
| Main Authors: | Yasir Abdelgadir , Mohamed, Azween, Abdullah |
|---|---|
| Format: | Citation Index Journal |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/687/ http://scholars.utp.edu.my/id/eprint/687/1/security_mechanism_for_MANETs-JESTEC.pdf |
Similar Items
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Immunology Inspired Framework for Securing MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al.
by: Yasir Abdelgadir , Mohamed, et al.
Securing Mobile Ad hoc Domain by Immune-Inspired Mechanism
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
MANET – A cogitation of its design and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Exploring manet security aspects: analysis of attacks and node misbehaviour issues
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
A Distributed Resource-Management Approach in MANETs
by: B., Pahlevanzadeh, et al.
Published: (2008)
by: B., Pahlevanzadeh, et al.
Published: (2008)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
A Cluster-Based Distributed Hierarchical IDS for MANETs
by: B., Pahlevanzadesh, et al.
Published: (2008)
by: B., Pahlevanzadesh, et al.
Published: (2008)
A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries
by: Elfaki, Mohamed, et al.
Published: (2019)
by: Elfaki, Mohamed, et al.
Published: (2019)
Mobile ad hoc network (MANET) performance through authentication approach by enhancing distributed trust model
by: Roslan, Irda
Published: (2007)
by: Roslan, Irda
Published: (2007)
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
Hybrid Hierarchical Approach For Addressing Service
Discovery Issues In MANETS.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
Security issues in 5G device to device communication
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
Simulation of EAP Method Selection and Negotiation Mechanism
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
EAP-based Authentication with EAP Method Selection Mechanism
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
PERFORMANCE EVALUATION OF SINGLE-PATH AND MULTIPATH MANETS ROUTING PROTOCOLS FOR DENSE AND SPARSE TOPOLOGY
by: Mahdi, Mohammed A., et al.
Published: (2017)
by: Mahdi, Mohammed A., et al.
Published: (2017)
Survivability Using Adaptive Reconfigurable Systems
by: Azween, Abdullah
Published: (2009)
by: Azween, Abdullah
Published: (2009)
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008)
by: Azween, Abdullah
Published: (2008)
Similar Items
-
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008) -
Immunology Inspired Framework for Securing MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009) -
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008) -
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al. -
Securing Mobile Ad hoc Domain by Immune-Inspired Mechanism
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)