Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Khondekar Lutful Hassan"'
Autor:
Sriyankar Acharyya, Joy Adhikary, Basavaraj M. Angadi, V.N. Manjunath Aradhya, Anjan Bandyopadhyay, Jyoti Sekhar Banerjee, Antara Banik, Arup Kumar Bhattacharjee, Joy Bhattacharjee, Himadri Biswas, Pratyay Biswas, Sagnick Biswas, Suparna Biswas, Fernando Cervantes-Sanchez, Arpita Chakraborty, Poornima M. Chanal, Ayan Chatterjee, Rohit Kamal Chatterjee, Sreeja Cherillath Sukumaran, Ivan Cruz-Aceves, Abhishek Das, Utsav Datta, Joydeep Dey, Arpan Deyasi, Om Prakash Dhakal, Rajarshi Dhar, Soumyadip Dhar, Martin W. Gerdes, Miguel-Angel Gil-Rios, Amlan Gupta, Mousumi Gupta, D.S. Guru, Igor Guryev, Khondekar Lutful Hassan, Daneshwari I. Hatti, Mayurakshi Jana, Mahabaleshwar S. Kakkasageri, Sunil Karforma, Pankaj Khatiwada, Subhadeep Koley, Gururaj S. Kori, Nimrita Koul, B.H. Lohithashva, Juan-Manuel López-Hernández, Sunil Kumar S. Manvi, Santiago Martinez, Kaniz Fatima Mian, Priyanjana Mitra, Sanjoy Mondal, Shukla Mondal, Soumen Mukherjee, Rajat Suvra Nandy, Ravi Ranjan, Hiranmoy Roy, Sayak Saha, Prashant Sangulagi, Soumen Santra, Debabrata Sarddar, Arindam Sarkar, Vaskar Sarkar, Priyajit Sen, Ali Shahaab, Labhvam Kumar Sharma, Ashok V. Sutagundar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b448a58f1431ade255f5adc166c85e9a
https://doi.org/10.1016/b978-0-12-822844-9.00054-2
https://doi.org/10.1016/b978-0-12-822844-9.00054-2
A pivotal research problem in the field of wireless sensor network (WSN)-assisted Internet of Things (IoT) is to enhance the network lifetime. One of the prime concerns is reducing the energy consumption of IoT devices. A traditional approach to this
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1d7cca4ea026b4483f9b925b6b458ef1
https://doi.org/10.1016/b978-0-12-822844-9.00014-1
https://doi.org/10.1016/b978-0-12-822844-9.00014-1
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811521874
In order to discard and detect rushing attacker in the network, this article analyses the MANET with dynamic threshold-based trust-oriented AODV (DTT-AODV) model. In the proposed method has been simulated and analyzed with predetermined threshold-bas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3191ef6c58054987ecd375d21d7ed95
https://doi.org/10.1007/978-981-15-2188-1_55
https://doi.org/10.1007/978-981-15-2188-1_55
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789813294523
In this paper a simulation-based performance analysis of AntHocNet has been performed. Ant colony optimization (ACO)-based routing protocol, AntHocNet and Ad hoc On-Demand Distance Vector (AODV) routing protocol have been considered as MANET routing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ce844d6b59288c237c51702b913104b5
https://doi.org/10.1007/978-981-32-9453-0_5
https://doi.org/10.1007/978-981-32-9453-0_5
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811064265
CICBA (1)
CICBA (1)
In this paper a new intrusion detection technique in MANET has been proposed, where a monitoring node fired agents that traverse each node sequentially and also detects the malicious node. The agent is based on the Recursively Modulo two and Bitwise
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::06d9352e11058c9fc816214323207460
https://doi.org/10.1007/978-981-10-6427-2_28
https://doi.org/10.1007/978-981-10-6427-2_28
Autor:
J. K. Mandal, Khondekar Lutful Hassan
In this paper a novel technique has been proposed for intrusion detection in MANET, where agents are fired from a node for each node randomly and detect the defective nodes. Detection is based on triangular encryption technique (TE)[9,10], and AODV[1
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6d3c6ed4b3795a5967b8e61c1a6d1e00
Autor:
J. K. Mandalr, Khondekar Lutful Hassan
Publikováno v:
Computer Science & Information Technology ( CS & IT ).
In this paper a technique for intrusion detection in MANET has been proposed where agents are fired from a node which traverses each node randomly and detect the malicious node. Detection is based on triangular encryption technique (TE) where AODV is
Autor:
Mandal, J. K., Khondekar Lutful Hassan
Publikováno v:
International Journal of Advanced Research in Computer Science; May/Jun2013, Vol. 4 Issue 3, p238-241, 4p