2016 International Conference on Inventive Computation Technologies (ICICT) 2016
DOI: 10.1109/inventive.2016.7823211
|View full text |Cite
|
Sign up to set email alerts
|

Trust or reputation base encryption decryption technique for preventing network from DOS attack in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…In this scenario, false information that interferes with the victem real data easily exposes the victim to inundation. And hackers use tools in today's internet environment that search unprotected systems and then install programs called zombies, an indicator of the ignorance of the user that his/her device has been hacked [12], [13].…”
Section: Dos Attackmentioning
confidence: 99%
“…In this scenario, false information that interferes with the victem real data easily exposes the victim to inundation. And hackers use tools in today's internet environment that search unprotected systems and then install programs called zombies, an indicator of the ignorance of the user that his/her device has been hacked [12], [13].…”
Section: Dos Attackmentioning
confidence: 99%