An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network using HTTP Traffic

DOI®: doi.org/10.21276/ijre.2019.6.2.1 CITATION: Ahmed, F., Juel Rahman, D., & Rashid, S. (2019). An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network using HTTP Traffic. International Journal Of Research And Engineering, 6(2), 575-579. doi:10.21276/ijre.2019.6.2.1 Author(s): 1Faisal Read More …

  • 1.4K
    Shares

Time-aware Traffic Shaper using Time-based Packet Scheduling on Intel I210

DOI®: doi.org/10.21276/ijre.2018.5.9.1 CITATION: Alhady, S., Othman, W., Wahab, A., Wahab, A., & Wong, P. (2018). Time-aware Traffic Shaper using Time-based Packet Scheduling on Intel I210. International Journal Of Research And Engineering, 5(9), 494-499. doi:10.21276/ijre.2018.5.9.1 Author(s): 1Syed Sahal Nazli Alhady, 2Wan Amir Fuad Read More …

  • 1.4K
    Shares