Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. An Advanced Signature System for OLSR ,D. Raffo, C. Adjih, T. Clausen, and P. M€ uhlethaler, “An advanced signature system for OLSR,” inProc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 10– 16.
    2. Attacks against OLSR: Distributed key management for security. C. Adjih, D. Raffo, and P. M€ uhlethaler, “Attacks against OLSR: Distributed key management for security,” inProc. 2nd OLSR Interop/Workshop, Palaiseau, France, 2005.
    3. Mukunthan. B, “A Neural Network Approach for Precise Pattern Identification of Human DNA”, International Journal of Neural Networks and Applications, Vol. 5, Issue 1, pp.21-27, 2012.
    4. An effective intrusion detection approach for olsrmanet protocol. M. Wang, L. Lamont, P. Mason, and M. Gorlatova, “An effective intrusion detection approach for olsrmanet protocol,” inProc. 1st IEEE ICNP Workshop Secure Netw. Protocols, Nov. 2005, pp. 55–60.
    5. A Survey Of Routing Attacks In Mobile Ad Hoc Networks, B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile ad hoc networks,”IEEE Wireless Commun., vol. 14, no. 5, pp. 85–91, Oct. 2007.
    6. Trends in Denial of Service Attack Technology CERT® Coordination Center Kevin J. Houle, CERT/CC George M. Weaver, CERT/CC In collaboration with: Neil Long Rob Thomas v1.0 - October 2001.
    7. Mukunthan. B and Nagaveni. N, “Identification of Unique Repeated Patterns, Location of Mutation in DNA Finger Printing Using Artificial Intelligence Technique”, International Journal of Bioinformatics Research and Applications, Vol. 10, Issue. 2, pp. 157-176, 2014,
    8. Large-scale Automated DDoS detection System by VyasSekar Carnegie Mellon University Nick Duffield AT&T Labs-Research Oliver Spatscheck AT&T LabsResearch-Annual Tech ’06: 2006 USENIX Annual Technical Conference
    9. J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. SAVE: source address validity enforcement protocol. In INFOCOM, June 2002.
    10. Bremler-Barr and H. Levy. Spooling prevention method. In Proc. IEEE INFOCOM, Miami, FL, March 2005.
    11. Mukunthan.B and Pushpalatha. A, “Automation of DNA Finger Printing for Precise Pattern Identification using Neural-Fuzzy Mapping Approach”, International Journal of Computer Applications, Vol. 13, Issue. 3, pp.16-24, 2011.
    12. K. Park and H. Lee. On the effectiveness of routebased packet filtering for distributed DoS attack prevention in power-law internets. In Proc. ACM SIGCOMM, San Diego, CA, August2001.
    13. F. Baker. Requirements for IP version 4 routers. RFC 1812, June 1995.
    14. Krishnakumar K.G, Dr.B.Mukunthan, “Cross Layer Based Adaptive Routing Approach for VANET”,International Journal of Control Theory and Applications, vol .9, Issue 40, pp. 161-169, 2016
    15. C. Jin, H. Wang, and K. Shin. Hop-count filtering: an effective defense against spoofed ddos traffic. In Proceedings of the 10th ACM conference on Computer and communications security,October 2003.

Recent Article