ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A review on intrusion detection system in mobile ad-hoc network
2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)
◽
10.1109/rise.2017.8378216
◽
2017
◽
Author(s):
Aumreesh Ku. Saxena
◽
Sitesh Sinha
◽
Piyush Shukla
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Related Documents
Cited By
References
A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network
International Journal of Computer Applications
◽
10.5120/2286-2968
◽
2011
◽
Vol 18
(6)
◽
pp. 34-39
Author(s):
S.S. Chopade
◽
N.N. Mhala
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Cluster based Intrusion Detection System for Mobile Ad-hoc Network
2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)
◽
10.1109/iconstem.2019.8918871
◽
2019
◽
Author(s):
S. Gopalakrishnan
◽
A. Rajesh
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network
2009 Pacific-Asia Conference on Circuits, Communications and Systems
◽
10.1109/paccs.2009.198
◽
2009
◽
Cited By ~ 3
Author(s):
Rakesh Shrestha
◽
Jong-Yeop Sung
◽
Sang-Duck Lee
◽
Pyung Sik-Yun
◽
Dong-You Choi
◽
...
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
An Anomaly-Based Intrusion Detection System with Multi-Dimensional Trust Parameters for Mobile Ad Hoc Network
International Journal of Intelligent Engineering and Systems
◽
10.22266/ijies2017.0831.09
◽
2017
◽
Vol 10
(4)
◽
pp. 81-90
Author(s):
Sharmasth Yeruru
◽
◽
Tiruchirai Rangaswamy
◽
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
A Co-Operative Intrusion Detection System in Mobile Ad-Hoc Network
Proceedings of the International Conference on Computer Applications — Networking
◽
10.3850/978-981-08-7301-1_1658
◽
2010
◽
Author(s):
Chopade S.S.
◽
Mhala N.N.
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
A Review on Trust and Security by using Intrusion Detection System in Mobile Ad Hoc Network
International Journal Of Engineering And Computer Science
◽
10.18535/ijecs/v6i5.09
◽
2017
◽
Author(s):
Rammurti Gupta,
◽
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Particle swarm optimisation algorithm-based intrusion detection system for mobile ad hoc network
International Journal of Autonomic Computing
◽
10.1504/ijac.2018.10018808
◽
2018
◽
Vol 3
(2)
◽
pp. 114
Author(s):
Shruti Dixit
◽
Rakesh Singhai
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Particle Swarm
◽
Particle Swarm Optimisation
◽
Mobile Ad Hoc
◽
Particle Swarm Optimisation Algorithm
Download Full-text
Improved routing security using intrusion detection system in mobile Ad Hoc network
2017 International Conference on Trends in Electronics and Informatics (ICEI)
◽
10.1109/icoei.2017.8300911
◽
2017
◽
Author(s):
Hemlata Kaurav
◽
Krishna Kumar Joshi
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Routing Security
◽
Mobile Ad Hoc
Download Full-text
SNACK: An efficient intrusion detection system in Mobile Ad-Hoc Network based on the Selective-Negative Acknowledgement algorithm
2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE)
◽
10.1109/ccece.2015.7129395
◽
2015
◽
Cited By ~ 1
Author(s):
A. Babak Emami
◽
Saeed Samet
◽
Abozar Azarpira
◽
Ali Farrokhtala
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Mobile Ad Hoc
Download Full-text
Particle swarm optimisation algorithm-based intrusion detection system for mobile ad hoc network
International Journal of Autonomic Computing
◽
10.1504/ijac.2018.097618
◽
2018
◽
Vol 3
(2)
◽
pp. 114
Author(s):
Shruti Dixit
◽
Rakesh Singhai
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Particle Swarm
◽
Particle Swarm Optimisation
◽
Mobile Ad Hoc
◽
Particle Swarm Optimisation Algorithm
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close