Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Detection of Network Worm to Eliminate Security Threats in MANET



Год выпуска: 2012
Автор: Shilpa Jaiswal and Sumeet Agrawal
Издательство: LAP Lambert Academic Publishing
Страниц: 52
ISBN: 9783659271809
Описание
The need of wireless network is to enforce participating nodes to forward packets to other nodes to foster secure and reliable communication. Although there are presence of vulnerable nodes that can be associated with malicious nodes and can harm networks. The varieties of these malicious nodes are vulnerable to nodes which are either compromised or falsely guided by vulnerable nodes.Malicious nodes can easily tamper the participating nodes in the networks. In mobile ad hoc network these attacks shown their significance in the terms of network worms which can attack, alter or modify the root definitions of network across all administrative and participating domains.One of the sever attack is wormhole attack. In this attack tunneling of packets can be done with vulnerable nodes.This current book focuses on significant study of routing protocols used in MANET, as well as a detailed study and discussion on various network worms considering wormholes attacks in MANET,their detection...


Похожие книги

  1. J. Scott Long, Panel to Study Gender Differences in Career Outcomes, Linda C. Skidmore, Catherine D. Gaddy, National Research Council. From Scarcity to Visibility: Gender Differences in the Careers of Doctoral Scientists and Engineer. – М.: , 0. – 0 с.
  2. Karen Ann Rolcik, Mark Warda, Karen Rolcik, Mark How to Form a Corporation in Florida Warda. How to Form a Corporation in Ohio (Legal Survival Guides). – М.: , 0. – 0 с.
  3. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с.
  4. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  5. Reid Hoffman, Ben Casnocha. The Start-up of You: Adapt to the Future, Invest in Yourself, and Transform Your Career. – М.: , 2012. – 272 с.
  6. Arun Singh Chandel. Study of Methods Used to Locate Partial Blockage in Subsea Flowlines. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  7. Saima Afzal. Non-Traditional Security Threats to Pakistan Post 9/11. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  8. Bhushan Thekedar,Uwe Oeh and Herwig Paretzke. Detection Of Lung Cancer With Breath Gas. – М.: Scholars' Press, 2015. – 172 с.
  9. Ahmed Ibrahim and Sanaa Eissa. Detection of Methylated RAR in the Urine of Bladder Cancer Patients. – М.: LAP Lambert Academic Publishing, 2012. – 248 с.
  10. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  11. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  12. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  13. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  14. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  15. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  16. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с.
  17. Eman A. Gani and Loay E. George. Detection of Diabetic Maculopathy Using Image Analysis Techniques. – М.: , 2014. – 164 с.

Образцы работ

Тема и предметТип и объем работы
Особенности мотивационной составляющей корпоративной культуры ОАО «Нижновэнерго»
Менеджмент
Диплом
100 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.



Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Екатерина
Спасибо Вам большое за консультацию. Поставили 5.