Adopting cross layer approach for detecting and segregating malicious nodes in MANET

JK Vinayagam, CH Balaswamy… - … Conference on Signal …, 2017 - ieeexplore.ieee.org
In this paper, we propose a cross layer approach to detect the malicious node in MANET.
We develop a cross layer data monitoring algorithm in order to correlate the MAC (Medium …

[PDF][PDF] Black Hole Attack and its Solutions in MANET

P Saranya, K Prathapchandran - … COMMUNICATION TECHNIQUES AND … - researchgate.net
Abstract Mobile Ad hoc Network is a self-configured, infrastructure less and wireless
network. Nodes in the network are working independently hence they do not depend on any …

[图书][B] Malicious attacks detection in wireless ad hoc networks

A Ranjan - 2017 - search.proquest.com
The network intrusion detection is a system whose primary role is to recognize the attacks on
the network. The term network represents interconnection between two nodes via wire or …

[PDF][PDF] Design and Implementation of Anomaly Detection System for Cloud Platform Based on Multiple Attribute Information

Y Yong-Wu - 2017 - dline.info
With the rapid development of computer, people are increasingly demanding the quality of
the mainstream cloud platform which is main forms of computer industry. In cloud monitoring …

[引用][C] Optimized Simulated Annealing Svm Classifier For Anomaly Intrusion Detection In Wireless Adhoc Network

K Murugan, DP Suresh - Australian Journal of Basic and Applied Sciences, 2017