ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks
Wireless Networks
◽
10.1007/s11276-009-0194-x
◽
2009
◽
Vol 16
(4)
◽
pp. 1157-1173
◽
Cited By ~ 4
Author(s):
Jin-Hee Cho
◽
Ing-Ray Chen
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Communication Systems
◽
Ad Hoc
◽
Group Communication
◽
Modeling And Analysis
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Group Communication Systems
Download Full-text
Related Documents
Cited By
References
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)
◽
10.1109/waina.2008.140
◽
2008
◽
Cited By ~ 5
Author(s):
Jin-Hee Cho
◽
Ing-Ray Chen
◽
Phu-Gui Feng
Keyword(s):
Performance Analysis
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Communication Systems
◽
Ad Hoc
◽
Group Communication
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Group Communication Systems
Download Full-text
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks
2009 International Conference on Computational Science and Engineering
◽
10.1109/cse.2009.68
◽
2009
◽
Cited By ~ 39
Author(s):
Jin-Hee Cho
◽
Ananthram Swami
◽
Ing-Ray Chen
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Communication Systems
◽
Trust Management
◽
Ad Hoc
◽
Group Communication
◽
Modeling And Analysis
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Group Communication Systems
Download Full-text
Enhanced intrusion detection techniques for mobile ad hoc networks
IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007)
◽
10.1049/ic:20070757
◽
2007
◽
Cited By ~ 4
Author(s):
L.P. Rajeswari
◽
R.A.X. Annie
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Techniques
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks
2011 IEEE International Conference on Communications (ICC)
◽
10.1109/icc.2011.5962858
◽
2011
◽
Cited By ~ 3
Author(s):
Shengrong Bu
◽
F. Richard Yu
◽
Peter X. Liu
◽
Helen Tang
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Efficient Method
◽
Ad Hoc
◽
Computationally Efficient
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS
Journal of Computer Science
◽
10.3844/jcssp.2013.521.525
◽
2013
◽
Vol 9
(4)
◽
pp. 521-525
◽
Cited By ~ 2
Author(s):
Vydeki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
Information Fusion
◽
10.1016/j.inffus.2007.03.001
◽
2008
◽
Vol 9
(1)
◽
pp. 96-119
◽
Cited By ~ 45
Author(s):
João B.D. Cabrera
◽
Carlos Gutiérrez
◽
Raman K. Mehra
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Ensemble Methods
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Survey on Intrusion Detection in Mobile Ad Hoc Networks
Wireless Network Security - Signals and Communication Technology
◽
10.1007/978-0-387-33112-6_7
◽
2007
◽
pp. 159-180
◽
Cited By ~ 59
Author(s):
Tiranuch Anantvalee
◽
Jie Wu
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Self-Organizing Distributed Intrusion Detection in Mobile Ad Hoc Networks
Advances in Soft Computing - Soft Computing as Transdisciplinary Science and Technology
◽
10.1007/3-540-32391-0_31
◽
2007
◽
pp. 233-242
Author(s):
James Cannady
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Self Organizing
Download Full-text
Towards adaptive intrusion detection in mobile ad hoc networks
IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.
◽
10.1109/glocom.2004.1379027
◽
2005
◽
Cited By ~ 10
Author(s):
Bo Sun
◽
Kui Wu
◽
U.W. Pooch
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
Advances in Parallel Distributed Computing - Communications in Computer and Information Science
◽
10.1007/978-3-642-24037-9_41
◽
2011
◽
pp. 410-419
◽
Cited By ~ 2
Author(s):
Yuvraj Singh
◽
Sanjay Kumar Jena
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Malicious Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close