[PDF][PDF] Cloud QoS, high availability & service security issues with solutions

M Zakarya, AA Khan - IJCSNS, 2012 - researchgate.net
Cloud Computing is a most recent and hottest buzzword nowadays, emerges as a key
service of the Utility or On demand computing [1] which builds on decade of research in the …

Analysis of simulation of DDOS attack in cloud

S Karthik, JJ Shah - International Conference on Information …, 2014 - ieeexplore.ieee.org
Cloud computing is one of the leading development technology of current era. It has got so
much of importance because of the high optimization of IT resources as a service to the …

[PDF][PDF] Grid high availability and service security issues with solutions

M Zakarya, AA Khan, H Hussain - 2010 - academia.edu
DDoS attacks are launched through sending a large quantity of packets to a target machine,
using instantaneous teamwork of multiple hosts which are distributed throughout the Grid …

Extended DDoS Confirmation & Attack Packet Dropping Algorithm in On-Demand Grid Computing Platform

M Zakarya - VAWKUM Transactions on Computer Sciences, 2013 - vfast.org
DDoS attacks are thrown through carriage of a large amount of packets to an objective
machine, using instantaneous teamwork of numerous hosts which are scattered throughout …

[PDF][PDF] Cloud QoS, High Availability & Service Security Issues with Solutions

M Zakarya, I ur Rahman, M Khan - Computing, 2011 - Citeseer
Cloud Computing is a most recent and hottest buzzword nowadays, emerges as a key
service of the Utility or On-demand computing [1] which builds on decade of research in the …

[PDF][PDF] Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique

DSM Sumiti - International Journal of Science and Research, ISSN - researchgate.net
In this work, a nearest neighbor analysis has been performed to detect the selfish nodes in
the active path and to generate a secure path. The existing AODV protocol is modified and a …

[PDF][PDF] Mobility Analysis of Blackhole Node Attacks in Mobile Adhoc Networks

R Rishi, DD Barak, Y Singh, P Rani - researchgate.net
Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes
in the network dynamically establish routing among themselves to form their own network on …

[PDF][PDF] Investigation of Network Layer Attacks and their Impact in MANETS

DD Barak, P Rani, SB Gupta - communications - academia.edu
Mobile ad hoc networks known to be vulnerable to many attacks due to their lack of
centralized control and their energy-consumed operation and dynamic topology. Security is …

[PDF][PDF] INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SURVEY OF VARIOUS SECURITY ATTACKS IN MANETS

P Rani, P Kaur - Citeseer
Mobile Ad hoc network (MANET) is considered a gathering of wireless portable nodes that
are accomplished of shared with each other without the usage of a network infrastructure …

[引用][C] Analysis of AODV Routing Protocol under Sinkhole Attack in Wireless Sensor Network

H Sehrawat, Y Singh, V Siwach - International Journal of Engineering & Technology, 2018