Search
Now showing items 1-5 of 5
Wireless sensor network: Routing protocols and attacks - A survey
(Institute of Electrical and Electronics Engineers Inc., 2015)
Based on end user application a network of hundreds or even thousands of sensor nodes, also known as wireless sensor network, can collect valuable data from an unassisted environment and transmit the information to the ...
Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System
(IJCTT, 2015)
Distributed Reflection Denial of Service (DRDOS) attack has become the daunting problem for businesses, system administrators, and computer system users. Distributed Reflective Denial of Service (DRDOS) attack typically ...
Prevention of Denial of Service Attack on Dynamic Source Routing VANET Protocol.
(IJRET, 2015)
Vehicular Ad Hoc Network (VANET) is a kind of Wireless Ad hoc Network in which node has high mobility, and thus the topology of the network is highly dynamic. VANET has thepotential to increase road safety, improve traffic ...
Code clone detection and analysis using software metrics and neural network: A Literature Review
(Eighth Sense Research Group, 2015)
Code clones are the duplicated code which degrade the software quality and hence increase the maintenance cost. Detection of clones in a large software system is very tedious tasks but it is necessary to improve the design, ...
Prevention of black hole attack over AODV and DSR MANET routing protocol
(WARSE, 2015)
Wireless technology is one of the biggest contributions to mankind. In wireless system, transmission of information can be done without the need of wires and cables. Mobile Adhoc Networks (MANETs) do not have any centralized ...