ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks
Wireless Personal Communications
◽
10.1007/s11277-018-5797-z
◽
2018
◽
Vol 101
(4)
◽
pp. 1901-1927
Author(s):
Sunil Kumar
◽
Kamlesh Dutta
◽
Anjani Garg
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Algorithm
◽
Attack Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
HIASA: Hybrid Improved Artificial Bee Colony and Simulated Annealing based Attack Detection Algorithm in Mobile Ad-hoc Networks (MANETs)
Bonfring International Journal of Industrial Engineering and Management Science
◽
10.9756/bijiems.10491
◽
2017
◽
Vol 7
(2)
◽
pp. 01-12
◽
Cited By ~ 1
Author(s):
P.V.S. Siva Prasad
◽
Dr.S. Krishna Mohan Rao
Keyword(s):
Simulated Annealing
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Artificial Bee Colony
◽
Ad Hoc
◽
Detection Algorithm
◽
Attack Detection
◽
Bee Colony
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Lightweight and distributed attack detection scheme in mobile ad hoc networks
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia - MoMM '09
◽
10.1145/1821748.1821782
◽
2009
◽
Cited By ~ 1
Author(s):
R. A. Raja Mahmood
◽
Anang Hudaya Muhamad Amin
◽
Amiza Amir
◽
Asad I. Khan
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Detection Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks
Computers & Electrical Engineering
◽
10.1016/j.compeleceng.2019.02.005
◽
2019
◽
Vol 74
◽
pp. 273-280
◽
Cited By ~ 2
Author(s):
M. Vigenesh
◽
R. Santhosh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Analysis Model
◽
Position Analysis
◽
Mobile Ad Hoc
◽
Routing Attack
◽
Hoc Networks
Download Full-text
CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networks
The Journal of Supercomputing
◽
10.1007/s11227-018-2494-3
◽
2018
◽
Vol 74
(10)
◽
pp. 5558-5577
Author(s):
Se-Hang Cheong
◽
Yain-Whar Si
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Algorithm
◽
Boundary Node
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Efficient analysis of lightweight Sybil attack detection scheme in Mobile Ad hoc Networks
2015 International Conference on Pervasive Computing (ICPC)
◽
10.1109/pervasive.2015.7086988
◽
2015
◽
Author(s):
Mohsin Mulla
◽
Santosh Sambare
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Sybil Attack
◽
Detection Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey
Journal of Network and Computer Applications
◽
10.1016/j.jnca.2018.01.004
◽
2018
◽
Vol 105
◽
pp. 105-122
◽
Cited By ~ 24
Author(s):
Gao Liu
◽
Zheng Yan
◽
Witold Pedrycz
Keyword(s):
Data Collection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks
Wireless Algorithms, Systems, and Applications - Lecture Notes in Computer Science
◽
10.1007/978-3-642-31869-6_46
◽
2012
◽
pp. 532-539
◽
Cited By ~ 2
Author(s):
Dapeng Wang
◽
Pei Li
◽
Pengfei Hu
◽
Kai Xing
◽
Yang Wang
◽
...
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)
◽
10.1109/mobisecserv.2018.8311439
◽
2018
◽
Cited By ~ 3
Author(s):
M. Rmayti
◽
Y. Begriche
◽
R. Khatoun
◽
L. Khoukhi
◽
A. Mammeri
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Wormhole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks
2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)
◽
10.1109/icnpcw.2007.4351486
◽
2007
◽
Cited By ~ 2
Author(s):
Gao Xiaopeng
◽
Chen Wei
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Detection Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks
2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)
◽
10.1109/npc.2007.88
◽
2007
◽
Cited By ~ 24
Author(s):
Gao Xiaopeng
◽
Chen Wei
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Detection Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close