An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
Vehicular Ad Hoc Networks (VANETs) are rapidly gaining attention due to the diversity of services that they can potentially offer. VANET is a wireless network that allows vehicles to interconnect and communicate with other nearby vehicles and Road Side Units (RSUs). In VANET, each vehicle is cons...
| Auteur principal: | Raenu , Kolandaisamy |
|---|---|
| Format: | Thèse |
| Publié: |
2020
|
| Sujets: |
Documents similaires
Early detection and mitigation of DDoS attacks in software defined networks
par: Al-Saadi, Mustafa Yahya Zakariya
Publié: (2018)
par: Al-Saadi, Mustafa Yahya Zakariya
Publié: (2018)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
par: Mohammed Ahmed Saad, Redhwan
Publié: (2016)
par: Mohammed Ahmed Saad, Redhwan
Publié: (2016)
Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network
par: Bojnord, Hoda Soltanian
Publié: (2013)
par: Bojnord, Hoda Soltanian
Publié: (2013)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
par: Elejla, Omar E. O.
Publié: (2018)
par: Elejla, Omar E. O.
Publié: (2018)
Performance analysis based on DDoS attack at MAC layer in WLAN / Zati Bayani Harun
par: Harun, Zati Bayani
Publié: (2019)
par: Harun, Zati Bayani
Publié: (2019)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
par: Khan, Samia
Publié: (2018)
par: Khan, Samia
Publié: (2018)
Spectrum sensing framework for infrastructure based cognitive vehicular communications / Chembe Christopher
par: Chembe , Christopher
Publié: (2017)
par: Chembe , Christopher
Publié: (2017)
A secure method to detect wormhole attack in mobile adhoc network
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
Analyzing network flows by applying fuzzy logic to detect denial of service attack (DOS)
par: Tabatabaei, Seyedeh Farzaneh
Publié: (2010)
par: Tabatabaei, Seyedeh Farzaneh
Publié: (2010)
An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks
par: Idris, Mohd. Yazid
Publié: (2008)
par: Idris, Mohd. Yazid
Publié: (2008)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
par: Adewole Kayode, Sakariyah
Publié: (2018)
par: Adewole Kayode, Sakariyah
Publié: (2018)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
par: Bilal , Ishfaq
Publié: (2016)
par: Bilal , Ishfaq
Publié: (2016)
Adaptive delay tolerant routing for enhanced connectivity in vehicular networks / Mostofa Kamal Nasir
par: Mostofa Kamal , Nasir
Publié: (2016)
par: Mostofa Kamal , Nasir
Publié: (2016)
Analysis of web worm attack on web application
par: Mohd. Ghazzali, Amalina
Publié: (2008)
par: Mohd. Ghazzali, Amalina
Publié: (2008)
Modified CSMA/CA MAC strategy for IOT enable intra-vehicular wireless communication systems
par: Ali, Md Jahan
Publié: (2018)
par: Ali, Md Jahan
Publié: (2018)
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
par: Mohammad Asif , Hossain
Publié: (2022)
par: Mohammad Asif , Hossain
Publié: (2022)
Detecting plaintext recovery attack in secure shell (SSH)
par: Ahmad Baidowi, Zaid Mujaiyid Putra
Publié: (2010)
par: Ahmad Baidowi, Zaid Mujaiyid Putra
Publié: (2010)
Effectiveness of structured query language injection attacks detection mechanisms
par: Mohamad, Nurul Zawiyah
Publié: (2008)
par: Mohamad, Nurul Zawiyah
Publié: (2008)
Client to client attacks protection in cloud computing by a secure virtualization model
par: Abadi, Ahad Akbar
Publié: (2013)
par: Abadi, Ahad Akbar
Publié: (2013)
Enhancing the robustness of digital video watermarking for copyright protection against collusion attack
par: Boroujerdizadeh, Ali
Publié: (2013)
par: Boroujerdizadeh, Ali
Publié: (2013)
An extended access control list for local network protection from insider attacks
par: Muamer N., Mohammed
Publié: (2011)
par: Muamer N., Mohammed
Publié: (2011)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
par: Suleman , Khan
Publié: (2017)
par: Suleman , Khan
Publié: (2017)
A secure method against frequency attack for pattern query on encrypted string data
par: Ravan, Rama Roshan
Publié: (2013)
par: Ravan, Rama Roshan
Publié: (2013)
A secure virtualization model for cloud computing to defend against distributed denial-of service attacks
par: Farahmandian, Sara
Publié: (2013)
par: Farahmandian, Sara
Publié: (2013)
Digital image watermarking based on three levels discrete wavelet transform to achive robustness against geometrical attacks
par: Dolatabadi, Zahra Sadat Shams
Publié: (2013)
par: Dolatabadi, Zahra Sadat Shams
Publié: (2013)
DDOS avoidance strategy for service avalibilty
par: AlRashidi, Bedour Fahhad Hamed
Publié: (2015)
par: AlRashidi, Bedour Fahhad Hamed
Publié: (2015)
Greedy intersection-mode routing strategy protocol for vehicular networks
par: Al-Khasawneh, Mahmoud Ahmad Salem
Publié: (2012)
par: Al-Khasawneh, Mahmoud Ahmad Salem
Publié: (2012)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
par: Ghaben, Ayman Ibrahim Ali
Publié: (2023)
par: Ghaben, Ayman Ibrahim Ali
Publié: (2023)
A novel image authenticationand rightful ownership detection framework based on DWT watermarking in cloud environment
par: Khaleghparast, Reza
Publié: (2013)
par: Khaleghparast, Reza
Publié: (2013)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
par: Nor Bakiah, Abd. Warif
Publié: (2018)
par: Nor Bakiah, Abd. Warif
Publié: (2018)
Latency reduction in packet forwarding and beaconing in vehicular ad hoc networks
par: Boroujerdi, Mojtaba Goudarzi
Publié: (2014)
par: Boroujerdi, Mojtaba Goudarzi
Publié: (2014)
Fuzzy trust model for trustworthiness of information in vehicular ad hoc network
par: Soleymani, Seyed Ahmad
Publié: (2019)
par: Soleymani, Seyed Ahmad
Publié: (2019)
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
par: Iftikhar , Ahmad
Publié: (2019)
par: Iftikhar , Ahmad
Publié: (2019)
Comprehensive possible attacks on RSA
par: Bakhtiari, Majid
Publié: (2008)
par: Bakhtiari, Majid
Publié: (2008)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
par: Abdul Razak, Aina Nabila
Publié: (2019)
par: Abdul Razak, Aina Nabila
Publié: (2019)
Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network
par: Sayyadi, Hamed
Publié: (2013)
par: Sayyadi, Hamed
Publié: (2013)
Enhanced blockchain consensus technique for trust model in vehicular Ad-hoc network
par: Nurfatih, Muhammad Sulkhan
Publié: (2021)
par: Nurfatih, Muhammad Sulkhan
Publié: (2021)
A secure and efficient revocation protocol for group signatures in vehicular ad hoc networks / Nur Fadhilah Mohd Shari
par: Nur Fadhilah , Mohd Shari
Publié: (2018)
par: Nur Fadhilah , Mohd Shari
Publié: (2018)
Communication lines management system
par: Wong, Kwai Yinn
Publié: (2008)
par: Wong, Kwai Yinn
Publié: (2008)
Improvement of self-organizing time divison multiple access in vehicular ad-hoc networks
par: Arif, Ari Sabir
Publié: (2014)
par: Arif, Ari Sabir
Publié: (2014)
Documents similaires
-
Early detection and mitigation of DDoS attacks in software defined networks
par: Al-Saadi, Mustafa Yahya Zakariya
Publié: (2018) -
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
par: Mohammed Ahmed Saad, Redhwan
Publié: (2016) -
Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network
par: Bojnord, Hoda Soltanian
Publié: (2013) -
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
par: Elejla, Omar E. O.
Publié: (2018) -
Performance analysis based on DDoS attack at MAC layer in WLAN / Zati Bayani Harun
par: Harun, Zati Bayani
Publié: (2019)