• No results found

EVALUATION OF INTRUSION DETECTION TECHNIQUES IN MOBILE AD HOC NETWORKS

N/A
N/A
Protected

Academic year: 2020

Share "EVALUATION OF INTRUSION DETECTION TECHNIQUES IN MOBILE AD HOC NETWORKS"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Table 1 shows the possible attacks.  interception, interruption, fabrication [14] etc
Fig. 1: Classification of IDS

References

Related documents

A new study by the Carbon Disclosure Project (CDP) examines several financial benefits of cloud computing, including an environmental benefit: reduced

Learning, knowledge and authority on site: a case study of safety practice.. John Rooke &

Table 3 shows that the specific gravity in day one to day seven, ranged between 1.45 to 1.43 in representative formula of Cefixime trihydrate, and 1.4 to 1.39 in marketed

We explore the relationship between ethnomethodology (EM), ethnography and the needs of managers and designers in industry, considering both ethnomethodological and industrial

Basalis epithelial cell proliferation in the wound area provides new cells in epithelial cell layer on top of granulated tissue.. Epithelial cells in this layer

The νCN vibrational band is not changed for all studied complexes, where the cyanide group is not involved in coordination, so coordination occurred through the carboxylic

Low toxicity, low cost, and biocompatibility makes them excellent candidates for in vivo bio-imaging, gene/drug delivery and cancer detection. This QD have too promised

In Scrum, various metrics are used to track the progress of the project and individual performance of team members. Different metrics are used to track the Scrum