Predict and prevent from misbehaving intruders in heterogeneous vehicular networks

H Sedjelmaci, SM Senouci, T Bouali - Vehicular Communications, 2017 - Elsevier
The great evolution of communication technologies and potential availability of network
access mediums and service providers have led to the appearance of heterogeneous …

A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT

JMSP Josh Kumar, A Kathirvel, N Kirubakaran… - EURASIP Journal on …, 2015 - Springer
Recent years have witnessed the increasing efforts toward making architecture
standardization for the secured wireless mobile ad hoc networks. In this scenario when a …

Efficient, secure, and privacy-preserving PMIPv6 protocol for V2G networks

MH Eiza, Q Shi, AK Marnerides… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
To ensure seamless communication between mobile electric vehicles (EVs) and EV power
supply equipment, support for ubiquitous and transparent mobile IP communications is …

[PDF][PDF] 网络加密流量识别研究综述及展望

潘吴斌, 程光, 郭晓军, 黄顺翔 - 通信学报, 2016 - infocomm-journal.com
鉴于加密流量识别技术的重要性和已有相关研究工作, 首先根据流量分析需求的层次介绍了加密
流量识别的类型, 如协议, 应用和服务. 其次, 概述已有加密流量识别技术, 并从多个角度进行分析 …

Fault detection and recovery scheme for routing and lifetime enhancement in WSN

M Yuvaraja, M Sabrigiriraj - Wireless Networks, 2017 - Springer
In WSNs, failures are unavoidable due to the inhospitable environment and unattended
deployment. The node failure leads to disconnection from the network and causes network …

Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks

MP Arthur, K Kannan - Wireless Networks, 2016 - Springer
Multicast communication of mobile ad hoc networks (MANET), rather than multiple unicast
communication, delivers common content to more than one receiver at a time. Due to cutting …

Insight2: A modular visual analysis platform for network situational awareness in large-scale networks

HADE Kodituwakku, A Keller, J Gregor - Electronics, 2020 - mdpi.com
The complexity and throughput of computer networks are rapidly increasing as a result of the
proliferation of interconnected devices, data-driven applications, and remote working …

An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks

S Behzad, R Fotohi, JH Balov, MJ Rabipour - arXiv preprint arXiv …, 2020 - arxiv.org
MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by
autonomous nodes, which have the ability to communicate with each other without having …

Towards blockchained challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - … and Network Security Workshops: ACNS 2019 …, 2019 - Springer
To protect distributed network resources and assets, collaborative intrusion detection
systems/networks (CIDSs/CIDNs) have been widely deployed in various organizations with …

Secure and economical multi-cloud storage policy with NSGA-II-C

J Yang, H Zhu, T Liu - Applied Soft Computing, 2019 - Elsevier
Multi-cloud computing is an attractive technology for many reasons including user's data
security. This work offers a solution to the problem relative to Multi-Cloud Storage (MCS), ie …