|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 27 occurrences of 18 keywords
|
|
|
Results
Found 22 publication records. Showing 22 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
131 | Floriano De Rango, Salvatore Marano |
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 1443-1448, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SAODV, security, MANET, intrusion detection |
108 | Mohaned Juwad, Hamed S. Al-Raweshidy |
Experimental Performance Comparisons between SAODV & AODV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 247-252, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SAODV, Security, Routing protocols, AODV, test-bed |
78 | Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S. Wong 0001, Joo-Han Song |
Experimental comparisons between SAODV and AODV routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMuNeP ![In: WMuNeP'05 - Proceedings of the First ACM Workshop on Wireless Multimedia Networking and Performance Modeling, Montreal, Quebec, Canada, October 13, 2005, pp. 113-122, 2005, ACM, 1-59593-183-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, routing, wireless ad hoc networks, testbed |
64 | Sanjeev Rana, Manpreet Singh |
I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC (1) ![In: Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I, pp. 91-100, 2011, Springer, 978-3-642-22708-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
46 | Gergely Ács, Levente Buttyán, István Vajda |
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers, pp. 113-127, 2005, Springer, 3-540-30912-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | K. Vanitha, A. M. J. Zubair Rahaman |
Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 22(6), pp. 13453-13461, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Megha Soni, Brijendra Kumar Joshi |
Security Assessment of SAODV Protocols in Mobile Ad hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIR ![In: Data Science and Big Data Analytics, ACM-WIR 2018, Women In Research 2018, Indore, India, 5-6 January 2018, pp. 347-355, 2018, Springer, 978-981-10-7640-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Ali A. Pouyan, Meisam Yadollahzadeh Tabari |
FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 30(1), 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Andrea Lupia, Floriano De Rango |
Energy consumption evaluation of SAODV with trust management scheme under gray-hole attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WTS ![In: 2015 Wireless Telecommunications Symposium, WTS 2015, New York City, NY, USA, April 15-17, 2015, pp. 1-8, 2015, IEEE, 978-1-4799-6776-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Mohamed A. Abdelshafy, Peter J. B. King |
AODV and SAODV under Attack: Performance Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22-27, 2014 Proceedings, pp. 318-331, 2014, Springer, 978-3-319-07424-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Jan von Mulert, Ian Welch, Winston Khoon Guan Seah |
Security threats and solutions in MANETs: A case study using AODV and SAODV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 35(4), pp. 1249-1259, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Ayman A. Hanafy, Sherif Hazem Noureldin, Marianne A. Azer |
Immunizing the SAODV protocol against routing information disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 330-334, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
32 | Floriano De Rango |
Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Interdiscip. Telecommun. Netw. ![In: Int. J. Interdiscip. Telecommun. Netw. 1(4), pp. 54-70, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Floriano De Rango |
Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WTS ![In: 2009 Wireless Telecommunications Symposium, WTS 2009, Prague, Czech Republic, April 22-24, 2009, pp. 1-8, 2009, IEEE, 978-1-4244-2588-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Songbai Lu, Longxuan Li, Kwok-Yan Lam, Lingyan Jia |
SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop Papers, pp. 421-425, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Davide Cerri, Alessandro Ghioni |
Securing AODV: the A-SAODV secure routing prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 46(2), pp. 120-125, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Manel Guerrero Zapata, N. Asokan |
Securing ad hoc routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2002 ACM Workshop on Wireless Security, Atlanta, GA, USA, September 28, 2002, pp. 1-10, 2002, ACM, 1-58113-585-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
SAODV, secure AODV, security, routing protocols, ad hoc wireless networks, hash chains |
23 | Li Wei 0004, Chen Ming, Li Mingming |
Information Security Routing Protocol in the WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 651-656, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Misagh Mohammadizadeh, Ali Movaghar 0001, Seyad Mohammad Safi |
SEAODV: secure efficient AODV routing protocol for MANETs networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 940-944, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
AODV, HEAP, one-way hash function, secure routing protocol |
23 | Jared Cordasco, Susanne Wetzel |
An attacker model for MANET routing security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 87-94, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, routing, ad-hoc, manet, attacker model |
23 | Kulasekaran A. Sivakumar, Mahalingam Ramkumar |
Safeguarding Mutable Fields in AODV Route Discovery Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 645-651, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 |
Rushing attacks and defense in wireless ad hoc network routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003, pp. 30-40, 2003, ACM, 1-58113-769-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
ad hoc network routing, security, routing, rushing |
Displaying result #1 - #22 of 22 (100 per page; Change: )
|
|