ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Survey of Intrusion Detection Systems for Mobile Ad Hoc Networks
2014 International Conference on Intelligent Networking and Collaborative Systems
◽
10.1109/incos.2014.27
◽
2014
◽
Cited By ~ 2
Author(s):
Qasim M Alriyami
◽
Eleana Asimakopoulou
◽
Nik Bessis
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
Computer Communications
◽
10.1016/j.comcom.2010.08.007
◽
2011
◽
Vol 34
(1)
◽
pp. 107-117
◽
Cited By ~ 76
Author(s):
Ming-Yang Su
Keyword(s):
Black Hole
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Intrusion Detection Systems in Mobile Ad Hoc Networks: State of The Art
International Journal on Computational Science & Applications
◽
10.5121/ijcsa.2015.5203
◽
2015
◽
Vol 5
(2)
◽
pp. 27-36
◽
Cited By ~ 1
Author(s):
Mohamed Elboukhari
◽
Mostafa Azizi
◽
Abdelmalek Azizi
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
State Of The Art
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Critical Review of Intrusion Detection Systems and Its Applicability in Mobile Ad Hoc Networks
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v6i8.890898
◽
2018
◽
Vol 6
(8)
◽
pp. 890-898
Author(s):
A. Chaudhary
◽
G. Shrimal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Critical Review
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks
Computer Systems Science and Engineering
◽
10.32604/csse.2022.018518
◽
2022
◽
Vol 40
(3)
◽
pp. 1199-1215
Author(s):
Vasaki Ponnusamy
◽
Mamoona Humayun
◽
N. Z. Jhanjhi
◽
Aun Yichiet
◽
Maram Fahhad Almufareh
Keyword(s):
Internet Of Things
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Intrusion Detection Systems in mobile ad hoc networks: A survey
2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS)
◽
10.1109/wcccs.2014.7107930
◽
2014
◽
Cited By ~ 5
Author(s):
Mohamed Elboukhari
◽
Mostafa Azizi
◽
Abdelmalek Azizi
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Survey on Intrusion Detection Systems in Mobile Ad-hoc Networks
IJARCCE
◽
10.17148/ijarcce.2017.63174
◽
2017
◽
Vol 6
(3)
◽
pp. 738-740
Author(s):
Sonika H R
◽
Poornnima BG
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Enhanced intrusion detection techniques for mobile ad hoc networks
IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007)
◽
10.1049/ic:20070757
◽
2007
◽
Cited By ~ 4
Author(s):
L.P. Rajeswari
◽
R.A.X. Annie
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Techniques
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks
2011 IEEE International Conference on Communications (ICC)
◽
10.1109/icc.2011.5962858
◽
2011
◽
Cited By ~ 3
Author(s):
Shengrong Bu
◽
F. Richard Yu
◽
Peter X. Liu
◽
Helen Tang
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Efficient Method
◽
Ad Hoc
◽
Computationally Efficient
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS
Journal of Computer Science
◽
10.3844/jcssp.2013.521.525
◽
2013
◽
Vol 9
(4)
◽
pp. 521-525
◽
Cited By ~ 2
Author(s):
Vydeki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Trust Based Intrusion Detection Systems (IDS) for AODV Routing Protocols over an Ad-Hoc Networks
International Journal of Advance Engineering and Research Development
◽
10.21090/ijaerd.010618
◽
2014
◽
Vol 1
(06)
◽
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Routing Protocols
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close