Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/196873
Title: | Mitigation of malicious nodes in mobile AD HOC networks using trust management |
Researcher: | C, Senthilkumar |
Guide(s): | Kamaraj, N |
Keywords: | Algorithms Anomaly Clustering Countermeasures Mobility |
University: | Anna University |
Completed Date: | 2016 |
Abstract: | Abstract available |
Pagination: | xviii, 112p. |
URI: | http://hdl.handle.net/10603/196873 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title page.pdf | Attached File | 24.71 kB | Adobe PDF | View/Open |
02_certificate.pdf | 344.94 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 65.11 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 5.21 kB | Adobe PDF | View/Open | |
05_table of content.pdf | 67.6 kB | Adobe PDF | View/Open | |
06_list of table.pdf | 5.44 kB | Adobe PDF | View/Open | |
07_list of figures.pdf | 81.75 kB | Adobe PDF | View/Open | |
08_list of symbols and abbreviations.pdf | 78.06 kB | Adobe PDF | View/Open | |
09_chapter 1.pdf | 886.42 kB | Adobe PDF | View/Open | |
10_chapter 2.pdf | 1.48 MB | Adobe PDF | View/Open | |
11_chapter 3.pdf | 679.52 kB | Adobe PDF | View/Open | |
12_chapter 4.pdf | 567.83 kB | Adobe PDF | View/Open | |
13_chapter 5.pdf | 722.56 kB | Adobe PDF | View/Open | |
14_chapter 6.pdf | 54.72 kB | Adobe PDF | View/Open | |
15_appendix.pdf | 487.34 kB | Adobe PDF | View/Open | |
16_references.pdf | 602.15 kB | Adobe PDF | View/Open | |
17_list of publication.pdf | 119.22 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: