H Messabih, CA Kerrache… - Transactions on …, 2024 - Wiley Online Library
In recent years, the advancements in wireless technologies and sensor networks have promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique …
A network anomaly detection method based on one-class SVM and active learning was presented. Firstly, the original instances were used to trained an one-class SVM model in …
NJ Patel, RH Jhaveri - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Mobile ad-hoc networks have to suffer with different types of packet dropping attacks. Therefore, we need strong mechanism to detect these malevolent nodes and to classify …
NJ Patel, RH Jhaveri - International Journal of Computer …, 2015 - researchgate.net
Mobile ad-hoc network is suffering with various attacks due to the infrastructure-less network. Hence, MANET needs very specific security methods to detect false entrance of the …
J Liu, LZ Gu, XX Niu, YX Yang - J. Commun, 2012 - infocomm-journal.com
A network anomaly detection method based on one-class SVM and active learning was presented. Firstly, the original instances were used to trained an one-class SVM model in …
A Mubarakali - Cognitive Informatics and Soft Computing: Proceeding …, 2021 - Springer
Mobile wireless sensor network (MWSN) consists of numerous wireless sensor nodes that can energetically build a network to transmit the details lacking the preset infrastructure. The …
Mobile Ad-Hoc Networks–MANETs are prevalent in healthcare monitoring of high blood pressure, high cholesterol levels and various heart conditions and cardiac misnomers like …
TJ Nagalakshmi… - Indian Journal of Public …, 2017 - search.ebscohost.com
MANET can suffer with packet loss, attacks, traffic, and congestion so the performance may degrade. To avoid this IDS technique is used. This survey discuss about the several SVM …
J Karlsson, M Westerlund, LS Dooley, G Pulkkis - 2014 - oro.open.ac.uk
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities. Therefore, routing in a …