ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks
2012 International Conference on Systems and Informatics (ICSAI2012)
◽
10.1109/icsai.2012.6223291
◽
2012
◽
Cited By ~ 1
Author(s):
Selvamani K
◽
Anbuchelian S
◽
Kanimozhi S
◽
Elakkiya R
◽
Bose S
◽
...
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Resource Consumption
◽
Hybrid Framework
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
SVM-based intrusion detection system for wireless ad hoc networks
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
◽
10.1109/vetecf.2003.1285404
◽
2003
◽
Cited By ~ 11
Author(s):
Hongmei Deng
◽
Qing-An Zeng
◽
D.P. Agrawal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Download Full-text
Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks
2008 International Conference on Signal Processing, Communications and Networking
◽
10.1109/icscn.2008.4447185
◽
2008
◽
Cited By ~ 8
Author(s):
S. Bose
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Denial Of Service
◽
Denial Of Service Attacks
◽
Cross Layer
◽
Hoc Networks
Download Full-text
A distributed intrusion detection system for wireless ad hoc networks
2008 16th IEEE International Conference on Networks
◽
10.1109/icon.2008.4772624
◽
2008
◽
Cited By ~ 11
Author(s):
Jaydip Sen
◽
Arijit Ukil
◽
Debasish Bera
◽
Arpan Pal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Distributed Intrusion Detection
◽
Distributed Intrusion Detection System
◽
Hoc Networks
Download Full-text
Intrusion detection system in wireless ad-hoc networks based on mobile agent technology
2010 2nd International Conference on Computer Engineering and Technology
◽
10.1109/iccet.2010.5486031
◽
2010
◽
Cited By ~ 1
Author(s):
Amira Hamdi Shabaan
◽
Hesham ElZouka
◽
Mohamed Abou ElNasr
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Mobile Agent
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Agent Technology
◽
Hoc Networks
Download Full-text
TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks
Computer Information Systems and Industrial Management - Lecture Notes in Computer Science
◽
10.1007/978-3-642-33260-9_6
◽
2012
◽
pp. 80-91
◽
Cited By ~ 5
Author(s):
Novarun Deb
◽
Nabendu Chaki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Download Full-text
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks
Computational Intelligence and Security - Lecture Notes in Computer Science
◽
10.1007/11596981_31
◽
2005
◽
pp. 204-211
◽
Cited By ~ 2
Author(s):
Ki-Won Yeom
◽
Ji-Hyung Park
Keyword(s):
Immune System
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Mobile Agents
◽
Ad Hoc
◽
Detection System
◽
Collaborative Intrusion Detection
◽
Hoc Networks
Download Full-text
Enhancing vehicular ad-hoc networks security using intrusion detection system techniques
Proceedings of the 4th International Conference on Smart City Applications - SCA '19
◽
10.1145/3368756.3369017
◽
2019
◽
Author(s):
Meriem Houmer
◽
Moulay Lahcen Hasnaoui
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Intrusion Detection System
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Download Full-text
EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS
Journal of Computer Science
◽
10.3844/jcssp.2013.521.525
◽
2013
◽
Vol 9
(4)
◽
pp. 521-525
◽
Cited By ~ 2
Author(s):
Vydeki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Soft Computing Technique for Intrusion Detection System in Mobile Ad Hoc Networks
Soft Computing in Wireless Sensor Networks
◽
10.1201/9780429438639-5
◽
2018
◽
pp. 95-114
Author(s):
V. Bapuji
◽
B. Manjula
◽
D. Srinivas Reddy
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Soft Computing
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Computing Technique
◽
Soft Computing Technique
◽
Hoc Networks
Download Full-text
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks
Lecture Notes in Computer Science - Information Security
◽
10.1007/11836810_29
◽
2006
◽
pp. 398-414
◽
Cited By ~ 6
Author(s):
Luciano Bononi
◽
Carlo Tacconi
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close