ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments
Personal Wireless Communications - Lecture Notes in Computer Science
◽
10.1007/11872153_16
◽
2006
◽
pp. 182-193
◽
Cited By ~ 11
Author(s):
Ricardo Puttini
◽
Maíra Hanashiro
◽
Fábio Miziara
◽
Rafael de Sousa
◽
L. Javier García-Villalba
◽
...
Keyword(s):
Intrusion Detection
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Mobile Ad Hoc
◽
Anomaly Intrusion Detection
◽
Network Environments
Download Full-text
Related Documents
Cited By
References
A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network
International Journal of Computer Applications
◽
10.5120/2286-2968
◽
2011
◽
Vol 18
(6)
◽
pp. 34-39
Author(s):
S.S. Chopade
◽
N.N. Mhala
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Reconfigurable context-sensitive middleware for ADS applications in mobile ad hoc network environments
Proceedings 5th International Symposium on Autonomous Decentralized Systems
◽
10.1109/isads.2001.917435
◽
2002
◽
Cited By ~ 16
Author(s):
S.S. Yau
◽
F. Karim
Keyword(s):
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Context Sensitive
◽
Mobile Ad Hoc
◽
Network Environments
Download Full-text
A review on intrusion detection system in mobile ad-hoc network
2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)
◽
10.1109/rise.2017.8378216
◽
2017
◽
Author(s):
Aumreesh Ku. Saxena
◽
Sitesh Sinha
◽
Piyush Shukla
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Three Phase Technique for Intrusion Detection in Mobile Ad Hoc Network
Communications in Computer and Information Science - Digital Information and Communication Technology and Its Applications
◽
10.1007/978-3-642-21984-9_55
◽
2011
◽
pp. 675-684
◽
Cited By ~ 4
Author(s):
K. V. Arya
◽
Prerna Vashistha
◽
Vaibhav Gupta
Keyword(s):
Intrusion Detection
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Three Phase
◽
Mobile Ad Hoc
Download Full-text
Collaborative context management framework for mobile ad hoc network environments
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
◽
10.1145/1774088.1774204
◽
2010
◽
Cited By ~ 2
Author(s):
Waskitho Wibisono
◽
Sea Ling
◽
Arkady Zaslavsky
Keyword(s):
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Context Management
◽
Management Framework
◽
Collaborative Context
◽
Mobile Ad Hoc
◽
Network Environments
Download Full-text
Performance evaluation of intrusion detection approach for Mobile ad-hoc network
2016 International Conference on ICT in Business Industry & Government (ICTBIG)
◽
10.1109/ictbig.2016.7892690
◽
2016
◽
Author(s):
Sonal Soni
◽
Arjun Parihar
◽
Trishna Panse
Keyword(s):
Performance Evaluation
◽
Intrusion Detection
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection Approach
◽
Mobile Ad Hoc
Download Full-text
Cluster based Intrusion Detection System for Mobile Ad-hoc Network
2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)
◽
10.1109/iconstem.2019.8918871
◽
2019
◽
Author(s):
S. Gopalakrishnan
◽
A. Rajesh
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Selective Watchdog Technique for Intrusion Detection in Mobile Ad-Hoc Network
International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks
◽
10.5121/jgraphoc.2014.6302
◽
2014
◽
Vol 6
(3)
◽
pp. 7-19
Author(s):
Deepika Dua
◽
Atul Mishra
Keyword(s):
Intrusion Detection
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Mobile Ad Hoc
Download Full-text
A survey of Mobile IP in cellular and Mobile Ad-Hoc Network environments
Ad Hoc Networks
◽
10.1016/j.adhoc.2003.09.011
◽
2005
◽
Vol 3
(3)
◽
pp. 351-370
◽
Cited By ~ 19
Author(s):
Tin-Yu Wu
◽
Ching-Yang Huang
◽
Han-Chieh Chao
Keyword(s):
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Mobile Ip
◽
Mobile Ad Hoc
◽
Network Environments
Download Full-text
A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network
2009 Pacific-Asia Conference on Circuits, Communications and Systems
◽
10.1109/paccs.2009.198
◽
2009
◽
Cited By ~ 3
Author(s):
Rakesh Shrestha
◽
Jong-Yeop Sung
◽
Sang-Duck Lee
◽
Pyung Sik-Yun
◽
Dong-You Choi
◽
...
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close