S Karthik, JJ Shah - International Conference on Information …, 2014 - ieeexplore.ieee.org
Cloud computing is one of the leading development technology of current era. It has got so much of importance because of the high optimization of IT resources as a service to the …
DDoS attacks are launched through sending a large quantity of packets to a target machine, using instantaneous teamwork of multiple hosts which are distributed throughout the Grid …
M Zakarya - VAWKUM Transactions on Computer Sciences, 2013 - vfast.org
DDoS attacks are thrown through carriage of a large amount of packets to an objective machine, using instantaneous teamwork of numerous hosts which are scattered throughout …
Cloud Computing is a most recent and hottest buzzword nowadays, emerges as a key service of the Utility or On-demand computing [1] which builds on decade of research in the …
DSM Sumiti - International Journal of Science and Research, ISSN - researchgate.net
In this work, a nearest neighbor analysis has been performed to detect the selfish nodes in the active path and to generate a secure path. The existing AODV protocol is modified and a …
Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes in the network dynamically establish routing among themselves to form their own network on …
DD Barak, P Rani, SB Gupta - communications - academia.edu
Mobile ad hoc networks known to be vulnerable to many attacks due to their lack of centralized control and their energy-consumed operation and dynamic topology. Security is …
Mobile Ad hoc network (MANET) is considered a gathering of wireless portable nodes that are accomplished of shared with each other without the usage of a network infrastructure …