Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks

J Kusyk, MU Uyar, CS Sahin - Evolutionary Intelligence, 2018 - Springer
In this paper, a comprehensive survey of evolutionary computation (EC) methods for
cybersecurity of mobile ad hoc networks (MANETs) is presented. Typically, EC methods are …

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks

S Sen, JA Clark - Computer Networks, 2011 - Elsevier
Intrusion detection on mobile ad hoc networks (MANETs) is difficult. This is because of their
dynamic nature, the lack of central points, and their highly resource-constrained nodes. In …

Machine learning based security solutions in MANETs: State of the art approaches

R Popli, M Sethi, I Kansal, A Garg… - Journal of physics …, 2021 - iopscience.iop.org
Abstract Machine learning (ML) techniques provide the learning capability to a system and
encourage adaptation into the environment, based upon many logical and statistical …

Power-aware intrusion detection in mobile ad hoc networks

S Şen, JA Clark, JE Tapiador - … Falls, Ontario, Canada, September 22-25 …, 2010 - Springer
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However
they are more vulnerable to attacks than wired networks. In addition, conventional intrusion …

[PDF][PDF] Swarm based detection and defense technique for malicious attacks in mobile ad hoc networks

G Indirani, K Selvakumar - International Journal of Computer Applications, 2012 - Citeseer
In mobile ad hoc networks (MANETs), the malicious flooding attack is very hazardous since
it not only clogs the victim node but also the entire network. Also it may cause packet drops …

A grammatical evolution approach to intrusion detection on mobile ad hoc networks

S Şen, JA Clark - Proceedings of the second ACM conference on …, 2009 - dl.acm.org
In recent years mobile ad hoc networks (MANETs) have become a very popular research
topic. By providing communication in the absence of a fixed infrastructure they are very …

Adversarial co-evolution of attack and defense in a segmented computer network environment

E Hemberg, JR Zipkin, RW Skowyra… - Proceedings of the …, 2018 - dl.acm.org
In computer security, guidance is slim on how to prioritize or configure the many available
defensive measures, when guidance is available at all. We show how a competitive co …

[图书][B] Evolutionary algorithms for mobile ad hoc networks

B Dorronsoro, P Ruiz, G Danoy, Y Pigné, P Bouvry - 2014 - books.google.com
Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize
day-to-day problems that arise for researchers in optimization and mobile networking Mobile …

Review on Security Attacks and Mechanism in VANET and MANET

S Balasubramani, SK Rani… - Artificial Intelligence and …, 2016 - Springer
Ad hoc wireless communication is an infrastructure-less network and adaptable to all
environments. It is characterized by self-organizing, dynamic topology, and self-healing …

Security issues in mobile ad hoc networks: A survey

S Kumar, K Dutta - … , Privacy, Trust, and Resource Management in …, 2014 - igi-global.com
Abstract A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network
of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not …