ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks
Cluster Computing
◽
10.1007/s10586-018-2686-x
◽
2018
◽
Vol 22
(S2)
◽
pp. 4065-4074
◽
Cited By ~ 4
Author(s):
S. Vimala
◽
V. Khanaa
◽
C. Nalini
Keyword(s):
Machine Learning
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Learning Algorithm
◽
Supervised Machine Learning
◽
Intrusion Detection Systems
◽
Machine Learning Algorithm
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Related Documents
Cited By
References
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
Computer Communications
◽
10.1016/j.comcom.2010.08.007
◽
2011
◽
Vol 34
(1)
◽
pp. 107-117
◽
Cited By ~ 76
Author(s):
Ming-Yang Su
Keyword(s):
Black Hole
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Intrusion Detection Systems in Mobile Ad Hoc Networks: State of The Art
International Journal on Computational Science & Applications
◽
10.5121/ijcsa.2015.5203
◽
2015
◽
Vol 5
(2)
◽
pp. 27-36
◽
Cited By ~ 1
Author(s):
Mohamed Elboukhari
◽
Mostafa Azizi
◽
Abdelmalek Azizi
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
State Of The Art
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A Critical Review of Intrusion Detection Systems and Its Applicability in Mobile Ad Hoc Networks
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v6i8.890898
◽
2018
◽
Vol 6
(8)
◽
pp. 890-898
Author(s):
A. Chaudhary
◽
G. Shrimal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Critical Review
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A Survey of Intrusion Detection Systems for Mobile Ad Hoc Networks
2014 International Conference on Intelligent Networking and Collaborative Systems
◽
10.1109/incos.2014.27
◽
2014
◽
Cited By ~ 2
Author(s):
Qasim M Alriyami
◽
Eleana Asimakopoulou
◽
Nik Bessis
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks
Computer Systems Science and Engineering
◽
10.32604/csse.2022.018518
◽
2022
◽
Vol 40
(3)
◽
pp. 1199-1215
Author(s):
Vasaki Ponnusamy
◽
Mamoona Humayun
◽
N. Z. Jhanjhi
◽
Aun Yichiet
◽
Maram Fahhad Almufareh
Keyword(s):
Internet Of Things
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Intrusion Detection Systems in mobile ad hoc networks: A survey
2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS)
◽
10.1109/wcccs.2014.7107930
◽
2014
◽
Cited By ~ 5
Author(s):
Mohamed Elboukhari
◽
Mostafa Azizi
◽
Abdelmalek Azizi
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A Survey on Intrusion Detection Systems in Mobile Ad-hoc Networks
IJARCCE
◽
10.17148/ijarcce.2017.63174
◽
2017
◽
Vol 6
(3)
◽
pp. 738-740
Author(s):
Sonika H R
◽
Poornnima BG
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A Model-Based Reinforcement Learning Algorithm for Routing in Energy Harvesting Mobile Ad-Hoc Networks
Wireless Personal Communications
◽
10.1007/s11277-017-3987-8
◽
2017
◽
Vol 95
(3)
◽
pp. 3119-3139
◽
Cited By ~ 2
Author(s):
Meisam Maleki
◽
Vesal Hakami
◽
Mehdi Dehghan
Keyword(s):
Reinforcement Learning
◽
Energy Harvesting
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Learning Algorithm
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Reinforcement Learning Algorithm
Start Chat
Download Full-text
Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning Algorithm
2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService)
◽
10.1109/bigdataservice.2018.00050
◽
2018
◽
Cited By ~ 8
Author(s):
Kinam Park
◽
Youngrok Song
◽
Yun-Gyung Cheong
Keyword(s):
Machine Learning
◽
Intrusion Detection
◽
Learning Algorithm
◽
Intrusion Detection Systems
◽
Machine Learning Algorithm
◽
Detection Systems
Start Chat
Download Full-text
Machine Learning Based Detection of Gray-Hole Attack in Mobile Ad-Hoc Networks
3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication - Lecture Notes on Data Engineering and Communications Technologies
◽
10.1007/978-3-030-44372-6_13
◽
2020
◽
pp. 149-158
Author(s):
Sunil Poyyagadde Rao
◽
Deepak Devaru Joshi
◽
Juzi Zhao
Keyword(s):
Machine Learning
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close