A survey on intrusion detection and prevention in wireless ad-hoc networks

K Khan, A Mehmood, S Khan, MA Khan, Z Iqbal… - Journal of Systems …, 2020 - Elsevier
Ad hoc networks have been serving us in one way or the other, for two decades, through
their vast variety of applications in majority fields. Due to their features such as hostile …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

A wrapper‐based feature selection for improving performance of intrusion detection systems

M Samadi Bonab, A Ghaffari… - International Journal …, 2020 - Wiley Online Library
Along with expansion in using of Internet and computer networks, the privacy, integrity, and
access to digital resources have been faced with permanent risks. Due to the unpredictable …

A novel machine learning framework for diagnosing the type 2 diabetics using temporal fuzzy ant miner decision tree classifier with temporal weighted genetic …

G Bhuvaneswari, G Manikandan - Computing, 2018 - Springer
Diabetic is becoming a very serious disease today for the most of people all over the world
due to the unhealthy food habits. For predicting the diabetes, we introduce a new diabetic …

Intelligent Agent‐Based Intrusion Detection System Using Enhanced Multiclass SVM

S Ganapathy, P Yogesh… - Computational intelligence …, 2012 - Wiley Online Library
Intrusion detection systems were used in the past along with various techniques to detect
intrusions in networks effectively. However, most of these systems are able to detect the …

An efficient mixed attribute outlier detection method for identifying network intrusions

JR Beulah, DS Punithavathani - International Journal of Information …, 2020 - igi-global.com
Intrusion detection systems (IDS) play a vital role in protecting information systems from
intruders. Anomaly-based IDS has established its effectiveness in identifying new and …

A hybrid nested genetic-fuzzy algorithm framework for intrusion detection and attacks

R Elhefnawy, H Abounaser, A Badr - IEEE Access, 2020 - ieeexplore.ieee.org
Intrusion Detection System (IDS) plays a very important role in security systems. Among its
different types, Network Intrusion Detection System (NIDS) has an effective role in …

Non-parametric sequence-based learning approach for outlier detection in IoT

N Nesa, T Ghosh, I Banerjee - Future Generation Computer Systems, 2018 - Elsevier
Although study on outlier detection techniques has long been an area of much research, few
of those works relate to an Internet of Things (IoT) environment. In the last few years, with the …

Automatic optimization of outlier detection ensembles using a limited number of outlier examples

N Reunanen, T Räty, T Lintonen - … Journal of Data Science and Analytics, 2020 - Springer
In data analysis, outliers are deviating and unexpected observations. Outlier detection is
important, because outliers can contain critical and interesting information. We propose an …

Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks

W Wang, H Wang, B Wang, Y Wang, J Wang - Information Sciences, 2013 - Elsevier
Anomaly detection is indispensable for satisfying security services in mobile ad hoc network
(MANET) applications. Often, however, a highly secure mechanism consumes a large …