搜索资源列表
stage
- The sensor networks application domain continues to increase with the need for an effective security mechanism. The fact that WSN often deal with sensitive data operating in hostile and unexpected environments, makes the concept of security consi
NS2
- manet security techniques evolutionary
network_enc
- code is devloped for security in network in ns2.......in linux-code is devloped for security in network in ns2.......in linux..................
aodvattacker
- AODV attacker ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole attack but consequently im
JayaSudha
- Network related traffice avoidence with high security... program developed in ns2 simulation.
DEV-5th-paper
- cloud security in ns2
SUMMARY OF ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS
- This summary is based on the work of February, which is focused on reading papers about Ad hoc network and getting familiar with the domain before the research of the Master Subject “Multi-path Routing Protocol for Mobile Ad Hoc Network”. Mobile Ad h
scurity-NS
- security nS2 pour simulation
saodv-08242013_a-saodv.tar
- SAODV for ns2 security