Social engineering attacks: A survey

F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …

A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV

F Sakiz, S Sen - Ad Hoc Networks, 2017 - Elsevier
Vehicular ad hoc networks (VANETs) have become one of the most promising and fastest
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …

Security attacks in opportunistic mobile networks: A systematic literature review

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2023 - Elsevier
Abstract Opportunistic Mobile Networks (OMNs), also known as Delay Tolerant Networks
(DTNs), refer to wireless networks in which the mobile nodes (eg, smartphones, tablets …

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security: A Survey of Social Engineering Attacks and Steps for Mitigation of These Attacks

N Yathiraju, G Jakka, SK Parisa, O Oni - … Capabilities in Developing …, 2022 - igi-global.com
Cybersecurity refers to the organizational practices followed by the different multinational
companies to defend their computers, servers, mobile devices, and networks from malicious …

A modified algorithm to improve security and performance of AODV protocol against black hole attack

S Shahabi, M Ghazvini, M Bakhtiarian - Wireless Networks, 2016 - Springer
Ad Hoc network is a temporal network which is managed by autonomous nodes which have
the ability to communicate with each other without having fixed network infrastructure or any …

A study on social engineering attacks in cybersecurity

C Subbalakshmi, PK Pareek, R Sayal - Innovations in Computer Science …, 2022 - Springer
Due to improvements in data communication technology, humans can communicate with
each other in the world instantly. Private and confidential information available on virtual …

Misbehavior of nodes in IoT based vehicular delay tolerant networks VDTNs

GU Rehman, MIU Haq, M Zubair, Z Mahmood… - Multimedia Tools and …, 2023 - Springer
Abstract Various Internet of Things (IoT) applications are based and deployed on unstable
wireless networks like the Delay Tolerant Network (DTN). But effective DTN data …

MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network

TT Vo, NT Luong, D Hoang - Wireless Networks, 2019 - Springer
Wormhole attack is a serious security issue in Mobile Ad hoc Network where malicious
nodes may distort the network topology and obtain valuable information. Many solutions …

[Retracted] Study on DTN Routing Protocol of Vehicle Ad Hoc Network Based on Machine Learning

H Liang, Y Shang, S Wang - Wireless Communications and …, 2021 - Wiley Online Library
The vehicle‐mounted self‐organizing network is a part of the MANET network. It is placed
between the roadside vehicle and the fixed communication equipment. It can serve as a hub …

Securing mobile ad hoc networks: Challenges and solutions

S Kumar, K Dutta - International Journal of Handheld Computing …, 2016 - igi-global.com
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for
various types of applications such as military communication, emergency search and rescue …