ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)
◽
10.1109/waina.2008.140
◽
2008
◽
Cited By ~ 5
Author(s):
Jin-Hee Cho
◽
Ing-Ray Chen
◽
Phu-Gui Feng
Keyword(s):
Performance Analysis
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Communication Systems
◽
Ad Hoc
◽
Group Communication
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Group Communication Systems
Download Full-text
Related Documents
Cited By
References
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks
Wireless Networks
◽
10.1007/s11276-009-0194-x
◽
2009
◽
Vol 16
(4)
◽
pp. 1157-1173
◽
Cited By ~ 4
Author(s):
Jin-Hee Cho
◽
Ing-Ray Chen
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Communication Systems
◽
Ad Hoc
◽
Group Communication
◽
Modeling And Analysis
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Group Communication Systems
Download Full-text
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks
2009 International Conference on Computational Science and Engineering
◽
10.1109/cse.2009.68
◽
2009
◽
Cited By ~ 39
Author(s):
Jin-Hee Cho
◽
Ananthram Swami
◽
Ing-Ray Chen
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Communication Systems
◽
Trust Management
◽
Ad Hoc
◽
Group Communication
◽
Modeling And Analysis
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Group Communication Systems
Download Full-text
Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks
Performance Evaluation
◽
10.1016/j.peva.2010.09.005
◽
2011
◽
Vol 68
(1)
◽
pp. 58-75
◽
Cited By ~ 11
Author(s):
Jin-Hee Cho
◽
Ing-Ray Chen
Keyword(s):
Performance Analysis
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Key Management
◽
Ad Hoc
◽
Group Key Management
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Hierarchical Group
Download Full-text
A comprehensive performance analysis of zone based Intrusion Detection System in mobile ad hoc networks
2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN)
◽
10.1109/icscn.2015.7219887
◽
2015
◽
Cited By ~ 1
Author(s):
Nisha Soms
◽
R. Saji Priya
◽
A. Sukkiriya Banu
◽
P. Malathi
Keyword(s):
Performance Analysis
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Comprehensive Performance
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
To Cope with Misbehavior in Mobile Ad-Hoc Networks and Performance Analysis with DSR Protocol
i-manager’s Journal on Software Engineering
◽
10.26634/jse.4.4.1182
◽
2010
◽
Vol 4
(4)
◽
pp. 61-65
Author(s):
V. Sumalatha
◽
Prasanthi .
Keyword(s):
Performance Analysis
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
And Performance
◽
Hoc Networks
Download Full-text
Enhanced intrusion detection techniques for mobile ad hoc networks
IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007)
◽
10.1049/ic:20070757
◽
2007
◽
Cited By ~ 4
Author(s):
L.P. Rajeswari
◽
R.A.X. Annie
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Techniques
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Scenario-based performance analysis of routing protocols for mobile ad-hoc networks
Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking - MobiCom '99
◽
10.1145/313451.313535
◽
1999
◽
Cited By ~ 408
Author(s):
Per Johansson
◽
Tony Larsson
◽
Nicklas Hedman
◽
Bartosz Mielczarek
◽
Mikael Degermark
Keyword(s):
Performance Analysis
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocols
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks
2011 IEEE International Conference on Communications (ICC)
◽
10.1109/icc.2011.5962858
◽
2011
◽
Cited By ~ 3
Author(s):
Shengrong Bu
◽
F. Richard Yu
◽
Peter X. Liu
◽
Helen Tang
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Efficient Method
◽
Ad Hoc
◽
Computationally Efficient
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS
Journal of Computer Science
◽
10.3844/jcssp.2013.521.525
◽
2013
◽
Vol 9
(4)
◽
pp. 521-525
◽
Cited By ~ 2
Author(s):
Vydeki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Performance Analysis of Routing Protocols for CBR Traffic in Mobile Ad-Hoc Networks
Journal of Information
◽
10.18488/journal.104/2016.2.1/104.1.1.9
◽
2016
◽
Vol 2
(1)
◽
pp. 1-9
Author(s):
Md. Ashek Raihan Mahmud
◽
Md. Mahbubur Rahman
◽
Md. Sipon Miah
Keyword(s):
Performance Analysis
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocols
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close