• No results found

An Effective Intrusion Detection System for Detection and Correction of Gray Hole Attack in MANETs

N/A
N/A
Protected

Academic year: 2020

Share "An Effective Intrusion Detection System for Detection and Correction of Gray Hole Attack in MANETs"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig 1: Architecture of IDS
Fig 2: Comparison Graph of Number of Failures
Fig 7: Comparison Graph of Routing Overhead

References

Related documents

Therefore, we use the Monte Carlo method to calculate the cylinders percolation in a numerical grid (a parallelepiped N × N × M ) and apply the technique of unconstrained

One of the keys to an effective Vision Zero commitment is to have involvement from multi-disciplinary leader- ship, cooperation, and collaboration among road safety

Background: Addressing breast cancer patients ’ unmet supportive care needs in the early stage of their survivorship have become a prime concern because of its significant

In conclusion, the primary modelling exercise for the growth of this yeast on acrylamide yields important specific growth rates which were utilized successfully for

The present study had been a satisfactory attempt to formulate microspheres of nifedipine, an orally administered calcium channel blocker used in the treatment of

1) One of the possible solutions to control the depletion of natural resources is by the manufacture of artificial aggregate by pelletization process using fly ash a byproduct

We identi fi ed LINC00673 rs11655237 signi fi cantly increased susceptibility of GC in the Chinese population, possibly by down-regulating LINC00673 expression through creating a

Based on this technique we investigate the minimal effort for an adversary to obtain a failure in 3 cases: when he has access to a quantum computer, when he mounts a multi-target