Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

On data-centric trust establishment in ephemeral ad hoc networks

M Raya, P Papadimitratos, VD Gligor… - IEEE INFOCOM 2008 …, 2008 - ieeexplore.ieee.org
We argue that the traditional notion of trust as a relation among entities, while useful,
becomes insufficient for emerging data-centric mobile ad hoc networks. In these systems …

Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning

S Panigrahi, A Kundu, S Sural, AK Majumdar - Information Fusion, 2009 - Elsevier
We propose a novel approach for credit card fraud detection, which combines evidences
from current as well as past behavior. The fraud detection system (FDS) consists of four …

Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning

Z Wei, H Tang, FR Yu, M Wang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology
and open wireless medium, may lead to MANETs suffering from many security …

A taxi driving fraud detection system

Y Ge, H Xiong, C Liu, ZH Zhou - 2011 IEEE 11th International …, 2011 - ieeexplore.ieee.org
Advances in GPS tracking technology have enabled us to install GPS tracking devices in city
taxis to collect a large amount of GPS traces under operational time constraints. These GPS …

Assessing cyber resilience of additive manufacturing supply chain leveraging data fusion technique: A model to generate cyber resilience index of a supply chain

S Rahman, NUI Hossain, K Govindan, F Nur… - CIRP journal of …, 2021 - Elsevier
The ever-increasing use of technology in manufacturing and other sections of a supply chain
make it more susceptible to cyber threats. Perhaps additive manufacturing (AM) supply …

Trust-based social networks with computing, caching and communications: A deep reinforcement learning approach

Y He, C Liang, FR Yu, Z Han - IEEE Transactions on Network …, 2018 - ieeexplore.ieee.org
Social networks have continuously been expanding and trying to be innovative. The recent
advances of computing, caching, and communication (3C) can have significant impacts on …

Secure social networks in 5G systems with mobile edge computing, caching, and device-to-device communications

Y He, FR Yu, N Zhao, H Yin - IEEE Wireless Communications, 2018 - ieeexplore.ieee.org
Mobile social networks (MSNs) have continuously been expanding and trying to be
innovative. Recent advances of mobile edge computing (MEC), caching, and device-to …

CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks

OA Wahab, A Mourad, H Otrok, J Bentahar - Expert Systems with …, 2016 - Elsevier
The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET)
makes it quite vulnerable to different types of malicious attacks. Detecting such attacks has …

An enhanced intrusion detection framework for securing network layer of cloud computing

K Arjunan, CN Modi - 2017 ISEA Asia Security and Privacy …, 2017 - ieeexplore.ieee.org
Virtualization is a key enabler of Cloud computing. Due to the numerous vulnerabilities in
current implementations of virtualization, security is the major concern of Cloud computing …