[PDF][PDF] Gait-Skeleton: Skeleton Based Convolutional Neural Network Gait Recognition.

SM Alfayeed, BS Saini - Journal of Engineering Science & …, 2021 - researchgate.net
Gait recognition is an image/video-based biometric approach used to determine the identity
of individuals according to their style of walk, the direction of walk, or the manner of the walk …

[PDF][PDF] A fortify approach to secure aodv protocol against black hole attacks

C Lohi, SK Sharma - International Journal of Computer Applications, 2015 - Citeseer
The advent of mobile and miniature devices in wireless technology gives rise to new
paradigm called Mobile Ad-hoc Network (MANET). MANETs are self-maintaining, self …

[PDF][PDF] Diminution of MANET attacks by HOOSC scheme

A Kaur, MK Sidhu - International Journal of Science and Research (IJSR) - Citeseer
In this paper, an Ad-Hoc On Demand Distance Vector (AODV) protocol along with HOOSC
scheme is put forward which encrypts the message to be sent and provides security for …

A survey on attacks in Ad hoc on Demand Distance Vector protocol

MB Devi, T Kalaikumaran… - 2017 11th International …, 2017 - ieeexplore.ieee.org
Mobile Ad hoc Network (MANET) consists of several nodes which are configurable. It
consists of multiple number of wireless nodes. The nodes are mobile nodes. It consists of …

[PDF][PDF] Reducing False Positive Rate In Presence Of Black Hole And Gray Hole Attack Using Anamoly Based IDS

L Nayak, VK Parganiha - International Journal For Technological …, 2016 - academia.edu
Mobile ad hoc networks as we know are the latest trend in the wireless communication
technology. It is because MANET has numerous advantages which make it most suitable for …

[PDF][PDF] AODV: Security Consideration

SV Simpson, SP John - International Journal of Computer …, 2015 - academia.edu
ABSTRACT AODV (Ad hoc On Demand Vector) is a reactive routing protocol in wireless
mobile ad hoc network (MANET). AODV is accepted because of its capacity to adjust quickly …

[PDF][PDF] Review on Prevention and Detection of Black hole Attack in MANETs

HK Sampada, KR Shobha, S Rakhi - ijetcse.com
MANET (Mobile Ad-hoc NETwork) is an infrastructure less, dynamic, decentralized network.
Any node can join the network and leave the network at any point of time. Due to its …

[PDF][PDF] Various Attacks in MANET and its Counter Measures

M Singh, K Kaur - International Journal of Computer Applications, 2014 - Citeseer
In present years, Security is important concern in Mobile ad hoc Network. MANET is self
organized network which contains mobile nodes communicate with each other using …

[PDF][PDF] DCR-BASED HYBRID BLACK-HOLE AND GRAY-HOLE ATTACK DETECTION IN MANET

P Rathiga, S Sathappan - ictactjournals.in
Security of wireless network is a highly stimulating issue of today's life. The validation of all
route messages is very problematic one due to the mobility and frequently modifying …

[PDF][PDF] TRUSTED DSR ROUTING PROTOCOL TO WITHSTAND AGAINST GRAY HOLE ATTACK IN MANET USING Q-LEARNING

A Thirumavalavan, K Selvaraj - academia.edu
Routing is one of the required tasks in MANET to exchange packets among the mobile
nodes that is accomplished by routing protocols. Traditionally routing protocols are designed …