[PDF][PDF] Détection d'intrusions: Une nouvelle approche par systèmes multi-agents

K Boudaoud - 2002 - researchgate.net
Les réseaux et systèmes informatiques sont devenus des outils indispensables au
fonctionnement des entreprises. Ils sont aujourd'hui déployés dans tous les secteurs …

An efficient intrusion detection system for mobile ad hoc networks

BV Ram Naresh Yadav, B Satyanarayana… - Emerging Trends in …, 2013 - Springer
A Mobile ad hoc network is a collection of nodes that is connected through a wireless
medium forming rapidly changing topologies. Mobile ad hoc networks are vulnerable due to …

A robust trust aware secure intrusion detection in MANET

M Jegannath, P Sivakumar - International Conference on …, 2014 - ieeexplore.ieee.org
A mobile ad hoc network (MANET) is a self-configuring infra structure less network of mobile
devices connected by wireless. Each device in a MANET is free to move independently in …

Enhanced Reliable ACK (ERACK) Scheme for Detecting Misbehaving Nodes in MANETs

DC Mouly, CDVS Rao - IOP Conference Series: Materials …, 2020 - iopscience.iop.org
Abstract In Mobile Ad Hoc Networks (MANETs), the process of sending end-to-end
acknowledgement (ACK) for each packet by the destination, causes unnecessary overhead …

[PDF][PDF] Preemptive Routing & Intrusion Detection for MANETs

NS Chaitanya, V Ramesh, KV Kumar, SS Skandha… - constraints - researchgate.net
An ad-hoc network will often change rapidly in topology, this courses for routes in the
network to often disappear and new to arise. The Ad-hoc On-Demand Distance Vector …

[引用][C] An Enhanced Cross Layer Intrusion Detection and Adaptive Response Mechanism for MANETs

I Mecnatchi, K Palanivel - International journal advanced research in computer …, 2015

[引用][C] A survey on sinkhole attack detection methods in mobile ad-hoc networks

IJR Jebadurai, EB Rajsingh - 3rd International Conference on Machine Learning and …, 2011

[PDF][PDF] A combined solution for routing and medium access control layer attacks in mobile ad hoc networks

R Murugan, A Shanmugam - Journal of Computer Science, 2010 - Citeseer
Problem statement: In Mobile Ad hoc Network (MANET), both the routing layer and the
Medium Access Control (MAC) layer are vulnerable to several attacks. There are very few …

EAACK-a secure intrusion detection and prevention system for MANETs

P Joshi, P Nande, A Pawar, P Shinde… - 2015 international …, 2015 - ieeexplore.ieee.org
Wireless networks are been used now-a-days. The most important fact about wireless
network is it is mobile. It is thus used in many fields. One of the most important applications …

[PDF][PDF] A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET.

D Kheyri, M Karami - Comput. Inf. Sci., 2012 - pdfs.semanticscholar.org
In recent years, mobile ad hoc networks (MANET) have become an interesting research
area. This type of networks have a salient characteristics compare with wired networks …