ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Cluster Based Co-operative Game Theory Approach for Intrusion Detection in Mobile Ad-Hoc Grid
2008 16th International Conference on Advanced Computing and Communications
◽
10.1109/adcom.2008.4760460
◽
2008
◽
Cited By ~ 3
Author(s):
N Santosh
◽
R Saranyan
◽
kumar P Senthil
◽
V. Vetriselvi
Keyword(s):
Game Theory
◽
Intrusion Detection
◽
Ad Hoc
◽
Theory Approach
◽
Mobile Ad Hoc
Download Full-text
Related Documents
Cited By
References
An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory
JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY
◽
10.3724/sp.j.1146.2010.00225
◽
2010
◽
Vol 32
(9)
◽
pp. 2245-2248
Author(s):
Yi-nan Li
◽
Zhi-hong Qian
◽
Ying Liu
◽
Xun Zhang
Keyword(s):
Game Theory
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Model
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A game theory approach for enhancing QoS-aware routing in mobile Ad hoc networks
2009 First International Conference on Networked Digital Technologies
◽
10.1109/ndt.2009.5272153
◽
2009
◽
Cited By ~ 2
Author(s):
Nourddine Enneya
◽
Rachid Elmeziane
◽
Mohammed Elkoutbi
Keyword(s):
Game Theory
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Theory Approach
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Enhanced intrusion detection techniques for mobile ad hoc networks
IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007)
◽
10.1049/ic:20070757
◽
2007
◽
Cited By ~ 4
Author(s):
L.P. Rajeswari
◽
R.A.X. Annie
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Techniques
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks
2011 IEEE International Conference on Communications (ICC)
◽
10.1109/icc.2011.5962858
◽
2011
◽
Cited By ~ 3
Author(s):
Shengrong Bu
◽
F. Richard Yu
◽
Peter X. Liu
◽
Helen Tang
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Efficient Method
◽
Ad Hoc
◽
Computationally Efficient
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS
Journal of Computer Science
◽
10.3844/jcssp.2013.521.525
◽
2013
◽
Vol 9
(4)
◽
pp. 521-525
◽
Cited By ~ 2
Author(s):
Vydeki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network
International Journal of Computer Applications
◽
10.5120/2286-2968
◽
2011
◽
Vol 18
(6)
◽
pp. 34-39
Author(s):
S.S. Chopade
◽
N.N. Mhala
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
Information Fusion
◽
10.1016/j.inffus.2007.03.001
◽
2008
◽
Vol 9
(1)
◽
pp. 96-119
◽
Cited By ~ 45
Author(s):
João B.D. Cabrera
◽
Carlos Gutiérrez
◽
Raman K. Mehra
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Ensemble Methods
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A review on intrusion detection system in mobile ad-hoc network
2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)
◽
10.1109/rise.2017.8378216
◽
2017
◽
Author(s):
Aumreesh Ku. Saxena
◽
Sitesh Sinha
◽
Piyush Shukla
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Three Phase Technique for Intrusion Detection in Mobile Ad Hoc Network
Communications in Computer and Information Science - Digital Information and Communication Technology and Its Applications
◽
10.1007/978-3-642-21984-9_55
◽
2011
◽
pp. 675-684
◽
Cited By ~ 4
Author(s):
K. V. Arya
◽
Prerna Vashistha
◽
Vaibhav Gupta
Keyword(s):
Intrusion Detection
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Three Phase
◽
Mobile Ad Hoc
Download Full-text
A Survey on Intrusion Detection in Mobile Ad Hoc Networks
Wireless Network Security - Signals and Communication Technology
◽
10.1007/978-0-387-33112-6_7
◽
2007
◽
pp. 159-180
◽
Cited By ~ 59
Author(s):
Tiranuch Anantvalee
◽
Jie Wu
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close