Secured and anonymous data transmission in Manet environment using zone‐based intrusion detection system (English)
- New search for: Soms, Nisha
- New search for: Malathi, P.
- New search for: Soms, Nisha
- New search for: Malathi, P.
In:
Concurrency and Computation: Practice and Experience
;
31
, 12
;
2019
- Article (Journal) / Electronic Resource
-
Title:Secured and anonymous data transmission in Manet environment using zone‐based intrusion detection system
-
Contributors:Soms, Nisha ( author ) / Malathi, P. ( author )
-
Published in:
-
Publisher:
-
Publication date:2019-06-25
-
Size:1 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 31, Issue 12
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
Tracking control with event‐triggered strategy for multi‐agent systems with noisesTang, Zhaojun / Li, Chuandong et al. | 2019
-
C2C interaction quality identification with SVM based on Kano modelLiu, Yaqin / Luo, XinXing et al. | 2019
-
Analysis of an optimal PMU configuration method based on incomplete observationYang, Fan / Yan, Limei / Xu, Jianjun / Li, Hongyu et al. | 2019
-
Hierarchical group key management for secure data sharing in a cloud‐based environmentVelumadhava Rao, R. / Selvamani, K. / Kanimozhi, S. / Kannan, A. et al. | 2019
-
Theoretical and experimental study on the astigmatism self‐compensation in multi‐disk laser resonator based on exhaustive methodDu, Jinyu / Yi, Jiayu / Yang, Zhongming / Yu, Yi / Tu, Bo / An, Xiangchao et al. | 2019
-
Energy efficient low‐power full‐adder by 65 nm CMOS technology in ALUN, Suresh Kumar / K, Paramasivam et al. | 2019
-
Collaborating visual tracker based on particle filter and correlation filterLi, Weiguang / Wei, Wang / Qiang, Han / Shi, Mingquan et al. | 2019
-
A PCA and Mahalanobis distance‐based detection method for logical hardware TrojanHuang, Jiaoying / Yang, Daming / Gao, Cheng / Fu, Chengcheng et al. | 2019
-
Model updating and variability analysis of modal parameters for super high‐rise structureYe, Xijun / Chen, Bingcong et al. | 2019
-
Secured and anonymous data transmission in Manet environment using zone‐based intrusion detection systemSoms, Nisha / Malathi, P. et al. | 2019
-
An improved prediction algorithm of seamless tubing corrosion based on an extension neural networkWang, Ti‐chun / Tong, Chang‐sheng / Yao, Sheng‐hu et al. | 2019
-
Secure cloud‐based e‐learning system with access control and group key mechanismKanimozhi, S. / Kannan, A. / Suganya Devi, K. / Selvamani, K et al. | 2019
-
Design and implementation of intelligent energy control for tariff management using multi‐agent system in smart/micro gridSatheesh Kumar, G.S. / Nagarajan, C. et al. | 2019
-
Issue Information| 2019
-
Online and automatic identification of encryption network behaviors in big data environmentHejun, Zhu / Liehuang, Zhu et al. | 2019
-
Highly secure palmprint based biometric template using fuzzy vaultSujitha, V. / Chitra, D. et al. | 2019
-
Channel load based interference‐aware scheduling in military communication environmentVignesh, V. / Premalatha, K. et al. | 2019
-
Distinguish computer generated and digital images: A CNN solutionHe, Ming et al. | 2019
-
Distance variety preserving hashing for large‐scale retrievalZhai, Sheping et al. | 2019
-
The dynamics behaviors of Chay neuron model under different parametersKaijun, Wu / Chao, Yu / Dicong, Wang et al. | 2019
-
A random chemical reaction optimization algorithm based on dual containers strategy for multi‐rotor UAV path planning in transmission line inspectionYang, Qing / Yang, Zhong / Zhang, Tianyi / Hu, Guoxiong et al. | 2019
-
A high‐performance maintenance strategy for stochastic selective maintenanceZhao, Jing / Liu, Jianqi / Zhao, Zhenting / Xin, Miao / Chen, Yu et al. | 2019
-
Fog assisted IoT based medical cyber system for cardiovascular diseases affected patientsKarthick, T / Manikandan, M et al. | 2019
-
Strong authentication framework using statistical approach for cloud environmentsSubramanian, Nalini / Andrews, J. et al. | 2019
-
Study of single event transient induced by heavy‐ion in NMOS transistor and CMOS inverterGao, Cheng / Zhang, Rui / Huang, Jiaoying / Fu, Chengcheng et al. | 2019
-
An efficient method to resolve intraclass variability using highly refined HOG description model for human action recognitionK, Akila / S, Chitrakala et al. | 2019
-
Research on parallel solution of GRAPES Helmholtz equationLi, Jingmei / Tian, Qiao / Zheng, Fangyuan / Wu, Weifei / Wang, Jiaxiang et al. | 2019
-
An efficient RSA cryptosystem by applying cuckoo search optimization algorithmRaja shree, S. / Chilambu Chelvan, A. / Rajesh, M. et al. | 2019
-
Web‐cloud architecture levels and optimized MQTT and COAP protocol suites for web of thingsPrabhu Kumar, P.C. / Geetha, G. et al. | 2019
-
A robust recommended system based on attack detectionYang, Qin et al. | 2019
-
Removal of salt and pepper noise from images using hybrid filter (HF) and fuzzy logic noise detector (FLND)Senthil Selvi, A. / Sukumar, R. et al. | 2019
-
Effect of hole on sound absorption coefficient of micro‐perforated panels investigated by Melling computingWang, Kun / Wang, Wei / Yan, Xiong et al. | 2019
-
An efficient CBIR system based on color histogram, edge, and texture featuresSundara Vadivel, P. / Yuvaraj, D. / Navaneetha Krishnan, S. / Mathusudhanan, S.R. et al. | 2019