![]() |
|
"Classification and Review of Security Schemes in Mobile Computing"
written by Sathish Alampalayam Kumar ,
published by Wireless Sensor Network, Vol.2 No.6, 2010
has been cited by the following article(s):
[1]
Reputation-based internet protocol security: a multilayer security framework for mobile Ad Hoc networks
NULL
2010
[2]
Performance study of security mechanism for mobile agent domain
Master’s Thesis,Blekinge Institute of Technology
2011
[3]
Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc
Doctoral dissertation, Facultad de Informática
2014
[4]
ROLE OF HEAT OF HYDRATION IN ATTAINING EARLY STRENGTH GAIN OF CEMENT IN CONCRETE
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
2014
[5]
RECONFIGURABLE ARCHITECTURE FOR AUDIO WATERMARKING USING EMD
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
2015
[6]
A study of research trends and rends and rends and issues in wireless ad hoc networks
2014
[7]
Review of a Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on AODV-based MANETs
International Journal of Computer Science and Information Technologies
2015
[8]
Vulnerability Assessment for Security in Aviation Cyber-Physical Systems
2017
[9]
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV ROUTING PROTOCOL
International Journal in Foundations of Computer Science & Technology
2017
[10]
Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks
International Journal of Computer Applications Foundation of Computer Science
2017
[11]
Reputation detection based on incomplete β distribution for mobile agent in wireless sensor networks
International Journal of Distributed Sensor Networks
2017
[12]
Securing IoT-based Cyber-Physical Human Systems against Collaborative Attacks
2017
[13]
A Cloud-Based Service Delivery Platform for Effective Homeland Security
2017
[14]
A study of research trends and issues in wireless ad hoc networks
Handbook of Research on Progressive Trends in Wireless Communications and Networking
2016
[15]
Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks
International Journal of Computer Network and Information Security(IJCNIS)
2015
[17]
A Machine Learning Based Approach to Detect Malicious Fast Flux Networks
2018
[18]
A NOVEL SECURITY MODEL BASED ON TRUST TO SECURE MOBILE AGENTS IN PRAXIS OF MOBILE ADHOC NETWORKS
2019
[20]
Vulnerability Analysis of Mobile Agents Praxis in Mobile
2017
[21]
A Survey on the Security Features of Cryptographic Techniques in Mobile Devices
2016
[23]
A Survey of Intelligent Transportation Systems Security: Challenges and Solutions
2020