Survival of an Intrusion Tolerance Database System ijtsrd
While traditional secure database systems rely on prevention control and are very limited in surviving malicious attack, an intrusion tolerant database system can operate through attacks in such a way that the system can continue delivering essential services in the face of attacks. The emphasis of survivability is on continuity of operations, with the understanding […]
Comparative Analysis of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks IJTSRD
Mobile Ad hoc Networks (MANETs) are collection of wireless mobile nodes. MANETs are infrastructure less temporary networks. They do not have fixed static infrastructure. As no fixed infrastructure is available all nodes itself, work as receiver, transmitter as well as router. These nodes are also mobile so providing stable route is a big challenge. We […]