ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks
Computational Intelligence and Security - Lecture Notes in Computer Science
◽
10.1007/11596981_31
◽
2005
◽
pp. 204-211
◽
Cited By ~ 2
Author(s):
Ki-Won Yeom
◽
Ji-Hyung Park
Keyword(s):
Immune System
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Mobile Agents
◽
Ad Hoc
◽
Detection System
◽
Collaborative Intrusion Detection
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
SVM-based intrusion detection system for wireless ad hoc networks
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
◽
10.1109/vetecf.2003.1285404
◽
2003
◽
Cited By ~ 11
Author(s):
Hongmei Deng
◽
Qing-An Zeng
◽
D.P. Agrawal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Download Full-text
Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant
Computer Networks
◽
10.1016/j.comnet.2020.107174
◽
2020
◽
Vol 172
◽
pp. 107174
◽
Cited By ~ 3
Author(s):
Man Zhou
◽
Lansheng Han
◽
Hongwei Lu
◽
Cai Fu
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Intrusion Detection System
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Detection System
◽
Collaborative Intrusion Detection
◽
Hoc Networks
Download Full-text
Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks
2008 International Conference on Signal Processing, Communications and Networking
◽
10.1109/icscn.2008.4447185
◽
2008
◽
Cited By ~ 8
Author(s):
S. Bose
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Denial Of Service
◽
Denial Of Service Attacks
◽
Cross Layer
◽
Hoc Networks
Download Full-text
A distributed intrusion detection system for wireless ad hoc networks
2008 16th IEEE International Conference on Networks
◽
10.1109/icon.2008.4772624
◽
2008
◽
Cited By ~ 11
Author(s):
Jaydip Sen
◽
Arijit Ukil
◽
Debasish Bera
◽
Arpan Pal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Distributed Intrusion Detection
◽
Distributed Intrusion Detection System
◽
Hoc Networks
Download Full-text
A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks
2012 International Conference on Systems and Informatics (ICSAI2012)
◽
10.1109/icsai.2012.6223291
◽
2012
◽
Cited By ~ 1
Author(s):
Selvamani K
◽
Anbuchelian S
◽
Kanimozhi S
◽
Elakkiya R
◽
Bose S
◽
...
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Resource Consumption
◽
Hybrid Framework
◽
Hoc Networks
Download Full-text
HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks
2008 7th Computer Information Systems and Industrial Management Applications
◽
10.1109/cisim.2008.14
◽
2008
◽
Cited By ~ 11
Author(s):
Poly Sen
◽
Nabendu Chaki
◽
Rituparna Chaki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Collaborative Intrusion Detection
◽
Hoc Networks
Download Full-text
A Distributed Self-Adaptive Intrusion Detection System for Mobile Ad-hoc Networks Using Tamper Evident Mobile Agents
Procedia Computer Science
◽
10.1016/j.procs.2015.01.034
◽
2015
◽
Vol 46
◽
pp. 1203-1208
◽
Cited By ~ 5
Author(s):
Deepa Krishnan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Mobile Agents
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Self Adaptive
Download Full-text
Intrusion detection system in wireless ad-hoc networks based on mobile agent technology
2010 2nd International Conference on Computer Engineering and Technology
◽
10.1109/iccet.2010.5486031
◽
2010
◽
Cited By ~ 1
Author(s):
Amira Hamdi Shabaan
◽
Hesham ElZouka
◽
Mohamed Abou ElNasr
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Mobile Agent
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Agent Technology
◽
Hoc Networks
Download Full-text
Mobile Agents-Based Intrusion Detection System for Mobile Ad Hoc Networks
2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering
◽
10.1109/cicc-itoe.2010.45
◽
2010
◽
Cited By ~ 6
Author(s):
Yinan Li
◽
Zhihong Qian
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Mobile Agents
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks
Computer Information Systems and Industrial Management - Lecture Notes in Computer Science
◽
10.1007/978-3-642-33260-9_6
◽
2012
◽
pp. 80-91
◽
Cited By ~ 5
Author(s):
Novarun Deb
◽
Nabendu Chaki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close