|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 27 occurrences of 18 keywords
|
|
|
Results
Found 22 publication records. Showing 22 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
131 | Floriano De Rango, Salvatore Marano |
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
SAODV, security, MANET, intrusion detection |
108 | Mohaned Juwad, Hamed S. Al-Raweshidy |
Experimental Performance Comparisons between SAODV & AODV. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
SAODV, Security, Routing protocols, AODV, test-bed |
78 | Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S. Wong 0001, Joo-Han Song |
Experimental comparisons between SAODV and AODV routing protocols. |
WMuNeP |
2005 |
DBLP DOI BibTeX RDF |
security, routing, wireless ad hoc networks, testbed |
64 | Sanjeev Rana, Manpreet Singh |
I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network. |
ACC (1) |
2011 |
DBLP DOI BibTeX RDF |
|
46 | Gergely Ács, Levente Buttyán, István Vajda |
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
32 | K. Vanitha, A. M. J. Zubair Rahaman |
Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol. |
Clust. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Megha Soni, Brijendra Kumar Joshi |
Security Assessment of SAODV Protocols in Mobile Ad hoc Networks. |
WIR |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Ali A. Pouyan, Meisam Yadollahzadeh Tabari |
FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. |
Int. J. Commun. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Andrea Lupia, Floriano De Rango |
Energy consumption evaluation of SAODV with trust management scheme under gray-hole attacks. |
WTS |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Mohamed A. Abdelshafy, Peter J. B. King |
AODV and SAODV under Attack: Performance Comparison. |
ADHOC-NOW |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Jan von Mulert, Ian Welch, Winston Khoon Guan Seah |
Security threats and solutions in MANETs: A case study using AODV and SAODV. |
J. Netw. Comput. Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Ayman A. Hanafy, Sherif Hazem Noureldin, Marianne A. Azer |
Immunizing the SAODV protocol against routing information disclosure. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
32 | Floriano De Rango |
Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs. |
Int. J. Interdiscip. Telecommun. Netw. |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Floriano De Rango |
Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET. |
WTS |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Songbai Lu, Longxuan Li, Kwok-Yan Lam, Lingyan Jia |
SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. |
CIS (2) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Davide Cerri, Alessandro Ghioni |
Securing AODV: the A-SAODV secure routing prototype. |
IEEE Commun. Mag. |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Manel Guerrero Zapata, N. Asokan |
Securing ad hoc routing protocols. |
Workshop on Wireless Security |
2002 |
DBLP DOI BibTeX RDF |
SAODV, secure AODV, security, routing protocols, ad hoc wireless networks, hash chains |
23 | Li Wei 0004, Chen Ming, Li Mingming |
Information Security Routing Protocol in the WSN. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Misagh Mohammadizadeh, Ali Movaghar 0001, Seyad Mohammad Safi |
SEAODV: secure efficient AODV routing protocol for MANETs networks. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
AODV, HEAP, one-way hash function, secure routing protocol |
23 | Jared Cordasco, Susanne Wetzel |
An attacker model for MANET routing security. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
security, routing, ad-hoc, manet, attacker model |
23 | Kulasekaran A. Sivakumar, Mahalingam Ramkumar |
Safeguarding Mutable Fields in AODV Route Discovery Process. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 |
Rushing attacks and defense in wireless ad hoc network routing protocols. |
Workshop on Wireless Security |
2003 |
DBLP DOI BibTeX RDF |
ad hoc network routing, security, routing, rushing |
Displaying result #1 - #22 of 22 (100 per page; Change: )
|
|