The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SAODV with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2011 (16) 2012-2019 (6)
Publication types (Num. hits)
article(5) inproceedings(17)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 27 occurrences of 18 keywords

Results
Found 22 publication records. Showing 22 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
131Floriano De Rango, Salvatore Marano Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SAODV, security, MANET, intrusion detection
108Mohaned Juwad, Hamed S. Al-Raweshidy Experimental Performance Comparisons between SAODV & AODV. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SAODV, Security, Routing protocols, AODV, test-bed
78Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S. Wong 0001, Joo-Han Song Experimental comparisons between SAODV and AODV routing protocols. Search on Bibsonomy WMuNeP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, routing, wireless ad hoc networks, testbed
64Sanjeev Rana, Manpreet Singh I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network. Search on Bibsonomy ACC (1) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
46Gergely Ács, Levente Buttyán, István Vajda Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32K. Vanitha, A. M. J. Zubair Rahaman Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol. Search on Bibsonomy Clust. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Megha Soni, Brijendra Kumar Joshi Security Assessment of SAODV Protocols in Mobile Ad hoc Networks. Search on Bibsonomy WIR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Ali A. Pouyan, Meisam Yadollahzadeh Tabari FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
32Andrea Lupia, Floriano De Rango Energy consumption evaluation of SAODV with trust management scheme under gray-hole attacks. Search on Bibsonomy WTS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Mohamed A. Abdelshafy, Peter J. B. King AODV and SAODV under Attack: Performance Comparison. Search on Bibsonomy ADHOC-NOW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
32Jan von Mulert, Ian Welch, Winston Khoon Guan Seah Security threats and solutions in MANETs: A case study using AODV and SAODV. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
32Ayman A. Hanafy, Sherif Hazem Noureldin, Marianne A. Azer Immunizing the SAODV protocol against routing information disclosure. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
32Floriano De Rango Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs. Search on Bibsonomy Int. J. Interdiscip. Telecommun. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Floriano De Rango Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET. Search on Bibsonomy WTS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Songbai Lu, Longxuan Li, Kwok-Yan Lam, Lingyan Jia SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. Search on Bibsonomy CIS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Davide Cerri, Alessandro Ghioni Securing AODV: the A-SAODV secure routing prototype. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Manel Guerrero Zapata, N. Asokan Securing ad hoc routing protocols. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF SAODV, secure AODV, security, routing protocols, ad hoc wireless networks, hash chains
23Li Wei 0004, Chen Ming, Li Mingming Information Security Routing Protocol in the WSN. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Misagh Mohammadizadeh, Ali Movaghar 0001, Seyad Mohammad Safi SEAODV: secure efficient AODV routing protocol for MANETs networks. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AODV, HEAP, one-way hash function, secure routing protocol
23Jared Cordasco, Susanne Wetzel An attacker model for MANET routing security. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, routing, ad-hoc, manet, attacker model
23Kulasekaran A. Sivakumar, Mahalingam Ramkumar Safeguarding Mutable Fields in AODV Route Discovery Process. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 Rushing attacks and defense in wireless ad hoc network routing protocols. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ad hoc network routing, security, routing, rushing
Displaying result #1 - #22 of 22 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license