Security threats in mobile ad hoc networks

S Sen, JA Clark, JE Tapiador - Security of Self-Organizing …, 2010 - api.taylorfrancis.com
With the proliferation of cheaper, smaller, and more powerful mobile devices, mobile ad hoc
networks (MANETs) have become one of the fastest growing areas of research. This new …

[HTML][HTML] Classification and review of security schemes in mobile computing

SA Kumar - Wireless Sensor Network, 2010 - scirp.org
In this paper, we present the classification and review of security schemes in mobile
computing system. We classify these schemes based on types the infrastructure used in the …

[PDF][PDF] Framework for intrusion detection in IEEE 802.11 wireless mesh networks.

S Khan, KK Loo, ZU Din - Int. Arab J. Inf. Technol., 2010 - Citeseer
Intrusion detection system is one of the possible solutions to timely detect the intrusions and
alarm for appropriate action. So far many intrusion detection systems have been proposed …

Trust management in ad hoc networks

RT de Sousa Júnior, RS Puttini - Trust Modeling and Management in …, 2010 - igi-global.com
Mobile ad hoc networks (MANETs) are wireless networks whose mobile nodes exchange
information without the help of a predefined network infrastructure. MANET services, such as …

[PDF][PDF] Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment

D Jeyabharathi, D Sasireka… - IJCA Special Issue on “ …, 2010 - researchgate.net
In this new millennium most of the transactions depend on wireless network. In this context
highly secured transaction of information is the need of the hour. During the transaction …

[引用][C] 基于规范的移动Ad Hoc 网络分布式入侵检测

王芳, 易平, 吴越, 王之旸 - 计算机科学, 2010

[引用][C] Number 4-Article 8 Year of Publication: 2010