ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks
International Journal of Computer Applications
◽
10.5120/ijca2016908347
◽
2016
◽
Vol 135
(5)
◽
pp. 6-9
Author(s):
Sonal Soni
◽
Arjun Parihar
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks
31st Annual International Computer Software and Applications Conference - Vol. 2 - (COMPSAC 2007)
◽
10.1109/compsac.2007.18
◽
2007
◽
Cited By ~ 8
Author(s):
Yingfang Fu
◽
Jingsha He
◽
Guorui Li
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Scheme
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Novel Intrusion Detection Scheme Using Support Vector Machine Fuzzy Network for Mobile Ad Hoc Networks
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application
◽
10.1109/wmwa.2009.75
◽
2009
◽
Cited By ~ 5
Author(s):
Huike Li
◽
Daquan Gu
Keyword(s):
Support Vector Machine
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Support Vector
◽
Detection Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Fuzzy Network
Download Full-text
A cooperative intrusion detection scheme for clustered mobile ad hoc networks
2011 7th International Conference on Information Assurance and Security (IAS)
◽
10.1109/isias.2011.6122816
◽
2011
◽
Cited By ~ 1
Author(s):
Hajar Al-Hujailan
◽
Mznah Al-Rodhaan
◽
Abdullah Al-Dhelaan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Statistical analysis based efficient decentralized intrusion detection scheme for mobile ad hoc networks
2008 16th IEEE International Conference on Networks
◽
10.1109/icon.2008.4772601
◽
2008
◽
Cited By ~ 2
Author(s):
Parul Agarwal
◽
Brijesh Singh Yadav
◽
Joydeep Chandra
Keyword(s):
Statistical Analysis
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Enhanced intrusion detection techniques for mobile ad hoc networks
IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007)
◽
10.1049/ic:20070757
◽
2007
◽
Cited By ~ 4
Author(s):
L.P. Rajeswari
◽
R.A.X. Annie
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Techniques
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Lightweight and distributed attack detection scheme in mobile ad hoc networks
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia - MoMM '09
◽
10.1145/1821748.1821782
◽
2009
◽
Cited By ~ 1
Author(s):
R. A. Raja Mahmood
◽
Anang Hudaya Muhamad Amin
◽
Amiza Amir
◽
Asad I. Khan
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Detection Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks
2011 IEEE International Conference on Communications (ICC)
◽
10.1109/icc.2011.5962858
◽
2011
◽
Cited By ~ 3
Author(s):
Shengrong Bu
◽
F. Richard Yu
◽
Peter X. Liu
◽
Helen Tang
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Efficient Method
◽
Ad Hoc
◽
Computationally Efficient
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS
Journal of Computer Science
◽
10.3844/jcssp.2013.521.525
◽
2013
◽
Vol 9
(4)
◽
pp. 521-525
◽
Cited By ~ 2
Author(s):
Vydeki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
Information Fusion
◽
10.1016/j.inffus.2007.03.001
◽
2008
◽
Vol 9
(1)
◽
pp. 96-119
◽
Cited By ~ 45
Author(s):
João B.D. Cabrera
◽
Carlos Gutiérrez
◽
Raman K. Mehra
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Ensemble Methods
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Survey on Intrusion Detection in Mobile Ad Hoc Networks
Wireless Network Security - Signals and Communication Technology
◽
10.1007/978-0-387-33112-6_7
◽
2007
◽
pp. 159-180
◽
Cited By ~ 59
Author(s):
Tiranuch Anantvalee
◽
Jie Wu
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close