ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks
Mobile Networks and Applications
◽
10.1007/s11036-019-01505-2
◽
2020
◽
Cited By ~ 1
Author(s):
S. Sivanesh
◽
V. R. Sarma Dhulipala
Keyword(s):
Black Hole
◽
Intrusion Detection
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Detection Mechanism
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Hole Detection
Download Full-text
Related Documents
Cited By
References
Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc Networks
Wireless Personal Communications
◽
10.1007/s11277-021-09418-8
◽
2021
◽
Author(s):
S. Sivanesh
◽
V. R. Sarma Dhulipala
Keyword(s):
Black Hole
◽
Intrusion Detection
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Black Hole Attack
◽
Malicious Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS
Journal of Computer Science
◽
10.3844/jcssp.2013.521.525
◽
2013
◽
Vol 9
(4)
◽
pp. 521-525
◽
Cited By ~ 2
Author(s):
Vydeki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
Advances in Parallel Distributed Computing - Communications in Computer and Information Science
◽
10.1007/978-3-642-24037-9_41
◽
2011
◽
pp. 410-419
◽
Cited By ~ 2
Author(s):
Yuvraj Singh
◽
Sanjay Kumar Jena
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Malicious Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques
Communications in Computer and Information Science - Advances in Power Electronics and Instrumentation Engineering
◽
10.1007/978-3-642-20499-9_20
◽
2011
◽
pp. 117-122
◽
Cited By ~ 8
Author(s):
S. Ganapathy
◽
P. Yogesh
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Classification Techniques
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Homogeneous and hetrogeneous intrusion detection system in mobile ad hoc networks
2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE'16)
◽
10.1109/icctide.2016.7725343
◽
2016
◽
Cited By ~ 1
Author(s):
P. Ramkumar
◽
V. Vimala
◽
G. Sivakama Sundari
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes
International Journal of Grid and Distributed Computing
◽
10.14257/ijgdc.2014.7.6.20
◽
2014
◽
Vol 7
(6)
◽
pp. 241-256
Author(s):
S. Mamatha
◽
A. Damodaram
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Design an anomaly based fuzzy intrusion detection system for packet dropping attack in mobile ad hoc networks
2014 IEEE International Advance Computing Conference (IACC)
◽
10.1109/iadcc.2014.6779330
◽
2014
◽
Cited By ~ 16
Author(s):
Alka Chaudhary
◽
V.N. Tiwari
◽
Anil Kumar
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Packet Dropping
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Mobile agent intrusion detection system for Mobile Ad Hoc Networks: A non-overlapping zone approach
2008 4th IEEE/IFIP International Conference on Central Asia on Internet
◽
10.1109/canet.2008.4655310
◽
2008
◽
Cited By ~ 9
Author(s):
A.F Farhan
◽
D. Zulkhairi
◽
M.T. Hatim
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Mobile Agent
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A MOBILE AGENT BASED INTRUSION DETECTION SYSTEM ARCHITECTURE FOR MOBILE AD HOC NETWORKS
Journal of Computer Science
◽
10.3844/jcssp.2014.970.975
◽
2014
◽
Vol 10
(6)
◽
pp. 970-975
◽
Cited By ~ 27
Author(s):
Pattanayak
Keyword(s):
Intrusion Detection
◽
Mobile Ad Hoc Networks
◽
Mobile Agent
◽
System Architecture
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Agent Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Study on Intrusion Detection System of Mobile Ad-hoc Networks
Advances in Intelligent Systems and Computing - Soft Computing for Problem Solving
◽
10.1007/978-981-15-0184-5_27
◽
2019
◽
pp. 307-316
Author(s):
S. Sindhuja
◽
R. Vadivel
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close