"Classification and Review of Security Schemes in Mobile Computing"
written by Sathish Alampalayam Kumar,
published by Wireless Sensor Network, Vol.2 No.6, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] A NOVEL SECURITY MODEL BASED ON TRUST TO SECURE MOBILE AGENTS IN PRAXIS OF MOBILE ADHOC NETWORKS
2019
[2] A Machine Learning Based Approach to Detect Malicious Fast Flux Networks
2018
[3] Vulnerability Assessment for Security in Aviation Cyber-Physical Systems
2017
[4] AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV ROUTING PROTOCOL
International Journal in Foundations of Computer Science & Technology, 2017
[5] Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks
International Journal of Computer Applications Foundation of Computer Science, 2017
[6] Reputation detection based on incomplete β distribution for mobile agent in wireless sensor networks
International Journal of Distributed Sensor Networks, 2017
[7] Securing IoT-based Cyber-Physical Human Systems against Collaborative Attacks
2017
[8] A Cloud-Based Service Delivery Platform for Effective Homeland Security
2017
[9] A Comparative Analysis of Jellyfish Attacks and Black Hole Attack with Selfish Behavior Attack under AODV Routing Protocol
2017
[10] A study of research trends and issues in wireless ad hoc networks
Handbook of Research on Progressive Trends in Wireless Communications and Networking, 2016
[11] Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks
International Journal of Computer Network and Information Security(IJCNIS), 2015
[12] Review of a Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on AODV-based MANETs
International Journal of Computer Science and Information Technologies, 2015
[13] RECONFIGURABLE ARCHITECTURE FOR AUDIO WATERMARKING USING EMD
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY, 2015
[14] AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV ROUTING PROTOCOL
International Journal in Foundations of Computer Science & Technology (IJFCST), 2015
[15] A study of research trends and rends and rends and issues in wireless ad hoc networks
2014
[16] Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc
Doctoral dissertation, Facultad de Informática, 2014
[17] ROLE OF HEAT OF HYDRATION IN ATTAINING EARLY STRENGTH GAIN OF CEMENT IN CONCRETE
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY, 2014
[18] Performance study of security mechanism for mobile agent domain
Master’s Thesis,Blekinge Institute of Technology, 2011
[19] Reputation-based internet protocol security: a multilayer security framework for mobile Ad Hoc networks
2010
[20] Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobil Ad Hoc Networks
2010