Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Novel Solution to Handle DDOS Attack in MANET"
written by Meghna Chhabra, Brij Gupta, Ammar Almomani,
published by Journal of Information Security, Vol.4 No.3, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] An Analytical View of DoS or DDoS Attacks for Network Architecture
Distributed Intelligent Circuits and …, 2024
[2] Detecting and Mitigating Wormhole Attack Effect in MANETs Based on Hop Count Technique
… on Radio Electronics …, 2023
[3] Modeling of advanced threat actors: characterization, categorization and detection
2023
[4] Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks
… Applications of Artificial …, 2023
[5] Software-driven secure framework for mobile healthcare applications in IoMT
Intelligent Decision …, 2023
[6] Ddos attack detection through digital twin technique in metaverse
2023 IEEE …, 2023
[7] Intrusion detection and prevention of DDoS attacks in cloud computing environment: a review on issues and current methods
International Journal of Cloud …, 2023
[8] Secure routing protocol comparison analysis between RNBR with TMR and face
AIP Conference Proceedings, 2023
[9] A Novel Ddos Attack Detection Framework for Software-Defined Iot (Sd-Iot) Networks Using Machine Learning
Engineering Applications of Artificial Intelligence, 2023
[10] IoT Security using Machine Learning Techniques
Cyber Security Insights Magazine, 2022
[11] Cyber Security Traits of a Future-Ready Organization
Cyber Security Insights Magazine, 2022
[12] A survey on emerging security issues, challenges, and solutions for Internet of things (IoTs)
Advances in Malware and Data-Driven …, 2022
[13] Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future …
International Journal on Semantic Web and …, 2022
[14] Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System
Nawasrah, A Almomani… - Journal of Web …, 2022
[15] Deep-Learning and Machine-Learning-Based Techniques for Malware Detection and Data-Driven Network Security
Advances in Malware and Data …, 2022
[16] Edge Computing-Based DDoS Attack Detection for Intelligent Transportation Systems
Cyber Security, Privacy and Networking, 2022
[17] The Era of Advanced Machine Learning and Deep Learning Algorithms for Malware Detection
Advances in Malware …, 2022
[18] Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach
Advances in Malware and Data …, 2022
[19] A Systematic Survey on Various Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks (WSN)
2022 IEEE 7th International …, 2022
[20] Analysis of Quantum Computing-Based security of Internet of Things (IoT) Environment
Cyber Security Insights …, 2022
[21] Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment.
Intelligent Automation & Soft …, 2022
[22] Analysis of attacks on private cloud computing services that implicate denial of services (DOS)
Cyber Security Insights …, 2022
[23] Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers
Computers & Electrical …, 2022
[24] Deep reinforcement learning for optimal denial-of-service attacks scheduling
Science China Information Sciences, 2022
[25] Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures
International Journal on Semantic Web and Information Systems (IJSWIS), 2021
[26] A big data and deep learning based approach for ddos detection in cloud computing environment
2021 IEEE 10th Global …, 2021
[27] Top 50 Cyber Security Tools for IT and Business Professionals in 2022
2021
[28] BB Gupta
Int. J. Innovative Computing and Applications, 2021
[29] Detecção de DDoS por aprendizado de máquina
2021
[30] Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks
International Conference on …, 2021
[31] Entropy-based DDoS Attack Detection in Cluster-based Mobile Ad Hoc Networks.
Adhoc & Sensor Wireless Networks, 2021
[32] Analysis of Machine Learning Based DDoS Attack Detection Techniques in Software Defined Network
2021
[33] Analysis of Machine learning based XSS attack Detection Techniques
2021
[34] An improved agent protection model for distributed denial of service flooding attack traffics
2021
[35] Analysis of Deep learning models for Recognition and Interpretation of Indian Sign
2021
[36] Advancement of Cloud Computing and Big Data Analytics in Healthcare Sector Security
2021
[37] An Auction-Based Incentivized Solution Against DDoS Attacks
2021
[38] CNA Tactics and Techniques: A Structure Proposal
2021
[39] Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
2021
[40] A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic
Neural Computing and …, 2021
[41] A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack
2020
[42] An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
2020
[43] Designing interconnected haptic interfaces and actuators for teleoperations in mobile ad hoc networks
2020
[44] Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection
2020
[45] A Survey on Security in VANETs
2020
[46] A deep learning based HTTP slow DoS classification approach using flow data
2020
[47] A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
2020
[48] Perbandingan Kinerja Protokol ZRP (Zone Routing Protocol) dan HWMP (Hybrid Wireless Mesh Protocol) pada MANET (Mobile Ad hoc Network)
2020
[49] A lightweight Anomaly based DDoS flood attack detection for Internet of vehicles
2020
[50] Taxonomy of Payment Structures and Economic Incentive Schemes in Internet
2020
[51] The detection method of low-rate DoS attack based on multi-feature fusion
2020
[52] Cloud Computing Security: Taxonomy of Issues, Challenges, Case Studies, and Solutions
2020
[53] Factors Encouraging and Deterring Illegal Computer Hacking: Replicating and Extending Young and Zhang's Treatise on Illegal Computer Hacking
2019
[54] Machine learning for computer and cyber security: principle, algorithms, and practices
2019
[55] Performance Analysis of Network Intrusion Detection System using Machine Learning
International Journal of Advanced Computer Science and Applications, 2019
[56] Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices
2019
[57] Designing an Internet of Things Attack Simulator
2019
[58] AN ENERGY EFFICIENT V-LEACH ROUTING PROTOCOL IN WSN USING OPTIMIZATION TECHNIQUE
2019
[59] Simulation of an Enhanced Network Security Framework for Federal Polytechnic Mubi
2019
[60] Security in the internet of things: recent challenges and solutions
2019
[61] Machine Learning for Computer and Cyber Security
2019
[62] aODV routing protocol using Dynamic trust handshake-based Malicious Behavior Detection
2019
[63] Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
2019
[64] Smart Card Security: Applications, Attacks, and Countermeasures
2019
[65] Comparative study of intrusion detection system using machine learning
2019
[66] An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic
2019
[67] Analisis Perbandingan Kinerja Protokol AOMDV, DSDV, Dan ZRP Sebagai Protokol Routing Pada Mobile Ad-Hoc Network (MANET)
Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, 2018
[68] Analisis Perbandingan Kinerja Protokol AOMDV, DSDV, Dan ZRP
2018
[69] Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk
2018
[70] A Review on Information Security Program Development and Management
2018
[71] Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices
International Journal of E-Services and Mobile Applications (IJESMA), 2018
[72] SECURITY METHODS AGAINST TCP SYN FLOODING DDOS ATTACKS IN WIRELESS NETWORKS-A SURVEY
2018
[73] An efficient DDoS detection based on SU-Genetic feature selection
Cluster Computing, 2018
[74] Anomaly Detection in Networks Using Machine Learning
2018
[75] Security methods against tcp syn flooding ddos attacks in wireless networksa survey
2018
[76] Assessment of Honeypots: Issues, Challenges and Future Directions
International Journal of Cloud Applications and Computing (IJCAC), 2018
[77] Implementation of a personal area network for secure routing in MANETs by using low-cost hardware
2017
[78] Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
Arabian Journal for Science and Engineering, 2017
[79] Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks
Cluster Computing, 2017
[80] Security in Internet of Things: issues, challenges, taxonomy, and architecture
Telecommunication Systems, 2017
[81] Mitigate denial of service attacks in mobile ad-hoc networks
2017
[82] Secure Routing-Solution to Diminish DOS Attack in AODV Based MANET
2017
[83] Fighting against phishing attacks: state of the art and future challenges
Neural Computing and Applications, 2016
[84] Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
Neural Computing and Applications, 2016
[85] Trust or reputation base encryption decryption technique for preventing network from DOS attack in MANET
2016
[86] Toward Securing MANET Against the Energy Depletion Attack.
CRiSIS, 2015
[87] Toward Securing MANET Against the Energy Depletion Attack
International Conference on Risks and Security of Internet and Systems, 2015
[88] Proposed Method to Enhance the Performance of AOMDV under DDOS Attack
2015
[89] Improved EAACK scheme for detection and isolation of a malicious node in MANET
2015
[90] Proposed Method to Enhance the Performance of AOMDV under DDOS Attack.
International Journal of Security & Its Applications, 2015
[91] Security Mechanism for Mitigation of Flooding Attack under Group Mobility Model in MANET.
International Journal of Applied Engineering Research, 2015
[92] A Review on Mobile Ad-hoc Networks (MANET'S) with Attacks Impact
Imperial Journal of Interdisciplinary Research, 2015
[93] A modified algorithm to improve security and performance of AODV protocol against black hole attack
Wireless Networks, 2015
[94] A Survey on Discovery of Distributed Denial of Service Attacks in Cloud
International Journal of Computer Science Issues (IJCSI), 2015
[95] Implementation of personal area network for secure routing in MANET by using low cost hardware
2015
[96] EVALUASI KINERJA PROTOKOL AOMDV TERHADAP SERANGAN RUSHING DAN FLOODING PADA MANET DENGAN MENGGUNAKAN NETWORK SIMULATOR 2 (NS-2)
TRANSIENT, 2015
[97] EVALUASI KINERJA PROTOKOL AOMDV TERHADAP SERANGAN RUSHING DAN FLOODING PADA MANET DENGAN MENGGUNAKAN NETWORK SIMULATOR …
2015
[98] A Novel Approach on Sat Kaman Protocol to Prevent DOS Attack in MANET
2015
[99] A Novel Technique to Detect & Prevent Black & Gray Hole Attacks in Manet using TVRI Approach
2015
[100] A review on mobile ad-hoc network (MANETs) with Attacks and Impact
2015
[101] A review on mobile ad-hoc network MANETs with Attacks and Impact
2015
[102] An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET)
Research Journal of Applied Sciences, Engineering and Technology, 2014
[103] A Modified AODV-Mechanism to Prevent Root Request Flooding Attack in Mobile Adhoc Networks
EN Mohil, MK Dhankhar - ijritcc.org, 2014
[104] A survey of the mitigation methods against DoS attacks on MANETs
Science and Information Conference (SAI), 2014. IEEE, 2014
[105] Energy Attentive Multicast Routing Protocol for MANETs
JASC: Journal of Applied Science and Computations, 2014
[106] 258 Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
[107] Analysis of Data Security Issues in the Metaverse Environment
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top