[引用][C] Behavioral Intrusion Detection In Mobile Ad Hoc Networks

S Mamatha, A Damodaram - … journal of Mobile Network Communications Telematics …, 2013

[引用][C] A Review of Malicious Node Detection in Mobile Adhoc Networks

DD Punwatkar, KN Hande - International Journal of Computer Sciences and …, 2014

[引用][C] Intrusion detection model in MANETs using ANNs and ANFIS

Z Moradi, M Teshnehlab - Proceedings of CSIT 2011 International Conference on …, 2011

Intrusion detection systems in MANET: a review

E Amiri, H Keshavarz, H Heidari, E Mohamadi… - Procedia-Social and …, 2014 - Elsevier
Abstract Mobile Ad hoc Network consists of some nodes that are stand randomly in
operational environment. Because nodes are without any predefined infrastructure and …

[PDF][PDF] Performance analysis of intrusion detection in MANET

R Sharman, S Sharma - Computer Technoligy and Applications, 2011 - Citeseer
ABSTRACT A Mobile Adhoc Network is a collection of autonomous nodes or terminals
which communicate with each other by forming a multihop radio network without the aid of …

Security supervision of mobile ad hoc networks: a lightweight, robust and reliable Intrusion detection system

M Alattar - 2013 - theses.hal.science
Mobile Ad hoc NETworks (referred to as MANETs) continue increasing their presence in our
every day life. They become a corner stone in the commercial, the society, the military, the …

[PDF][PDF] Identification of compromised nodes in MANETs using machine learning technique

R Sebopelo, B Isong, N Gasela - International Journal of …, 2019 - researchgate.net
Mobile ad hoc networks (MANETs) are faced with various security challenges emanating
from malicious attacks. Their dynamic nature make nodes more vulnerable to attacks from …

[PDF][PDF] Enhanced Intrusion Detection System for Malicious Node Detection in Mobile Ad hoc Networks using Data Transmission Quality of Nodes

S Mamatha, A Damodaram - International Journal of Computer …, 2014 - mecs-press.net
Mobile Ad hoc NETworks (MANETs) are the new generation of networks that offer
unrestricted mobility without any underlying infrastructure. It relies on the cooperation of all …

Detection of malicious nodes in mobile ad hoc networks

RS Singamsetty - 2011 - rave.ohiolink.edu
In recent years, the rapid proliferation of wireless networks, usage of wireless devices and
deployment of many mobile computing devices and applications has changed the shape of …

[PDF][PDF] Mobile ad hoc network: a comprehensive study and survey on intrusion detection

S Gangwar - International Journal of Engineering Research and …, 2012 - Citeseer
In Present years, the security issues are most important concerns in mobile ad hoc network.
In comparison to wired network the mobile ad hoc network is more exposed to being …