Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks Journal title: International Journal of Research in Computer and Communication Technology Authors: S.Vivekananda devi Beebi Sufia Sheik Subject(s): Computer and Information Science, Telecommunications
A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack Journal title: International Journal of Research in Computer and Communication Technology Authors: K Pravardhan, U Vinod Kumar Subject(s): Computer and Information Science, Telecommunications
Cooperative Caching Strategy For Provisioning Cost Minimization In Social Wireless Networks(Swnet’s) Journal title: International Journal of Research in Computer and Communication Technology Authors: P Nagaraju, Rajesh Babu Nagineni Subject(s): Computer and Information Science, Telecommunications
Mobile Ad Hoc Networks Authentication Using NPV Method. Journal title: International Journal of Research in Computer and Communication Technology Authors: Koneru Sudhir, Rajesh Babu Nagineni Subject(s): Computer and Information Science, Telecommunications
Energy Efficient Group Key Management (EEGK) for Secure Data Processing in Ad Hoc and WSN Networks Journal title: International Journal of Research in Computer and Communication Technology Authors: K Haribabu, D Vijay Subject(s): Computer and Information Science, Telecommunications
LD: A Leak Detector Mechanism For Finding Misbehaving Nodes In MANETS Journal title: International Journal of Research in Computer and Communication Technology Authors: R S Lavanya Devi Magapu. ,SK.Ahmad Shah, ASST.PROF Subject(s): Computer and Information Science, Telecommunications
Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks Journal title: International Journal of Research in Computer and Communication Technology Authors: A. Bala Koteswari, N. V. Satya Pradeep. Kotla Subject(s): Computer and Information Science, Telecommunications
A Novel Approach for Reducing Routing Overhead In Mobile Ad hoc Network Journal title: International Journal of Research in Computer and Communication Technology Authors: T. Shekinah, M.Radhika Mani, B.A.S Roopa Devi Subject(s): Computer and Information Science, Telecommunications
Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure Journal title: International Journal of Research in Computer and Communication Technology Authors: G.Harsha Vardhan, Ch.Udaya Bhaskar Subject(s): Computer and Information Science, Telecommunications
To Demonstrate Best Cooperative Caching For Provisioning Cost Reduction In Networks Journal title: International Journal of Research in Computer and Communication Technology Authors: V. Neeharika, Y. Swathi Subject(s): Computer and Information Science, Telecommunications
Finest Lag Broadcast for Multihop Wireless Associations Exhausting Self-Interference Termination Journal title: International Journal of Research in Computer and Communication Technology Authors: S Chandra Sekhar Srinivas, K.N Brahmaji Rao Subject(s): Computer and Information Science, Telecommunications
Improving End-to-end Packet Delivery in High Traffic Multi-hop Wireless Ad Hoc Networks Journal title: EAI Endorsed Transactions on Energy Web Authors: Syed Rehan Afzal, Majid Nabi, Sander Stuijk, Twan Basten Subject(s): Computer and Information Science, Energy
A Survey on Security Issues and Challenges in Mobile Ad-hoc Network Journal title: EAI Endorsed Transactions on Energy Web Authors: G. Keerthana, P. Anandan Subject(s): Computer and Information Science, Energy
Social Aspect of Vehicular Communications Journal title: EAI Endorsed Transactions on Cloud Systems Authors: Leandros A. Maglaras, Efstathios Stathakidis, Jianmin Jiang Subject(s): Computer and Information Science
Bio-Inspired Routing Protocol Based on Pheromone Diffusion in Mobile Ad Hoc Networks Journal title: EAI Endorsed Transactions on Collaborative Computing Authors: Hyun-Ho Choi, Jung-Ryun Lee, Bongsoo Roh, Mijeong Hoh, HyungSeok Choi Subject(s): Computer and Information Science, Computer Architecture, Data Communication and Networks