Black hole detection using evolutionary algorithm for IDS/IPS in MANETs
暂无分享,去创建一个
[1] Harish Kumar,et al. Effect Of Black Hole Attack On AODV Routing Protocol In , .
[2] Raed A. Alsaqour,et al. A local intrusion detection routing security over MANET network , 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics.
[3] Lalit Himral,et al. Preventing AODV Routing Protocol from Black Hole Attack , 2011 .
[4] Prodipto Das,et al. Security Measures for Black Hole Attack in MANET: An Approach , 2012, ArXiv.
[5] Keecheon Kim,et al. Secure Route Discovery for Preventing Black Hole Attacks on AODV-Based MANETs , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[6] Ya-Jung Lee,et al. Stacking sequence optimization of laminated composite structures using genetic algorithm with local improvement , 2004 .
[7] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[8] Stephen Chen,et al. Particle swarm optimization with pbest crossover , 2012, 2012 IEEE Congress on Evolutionary Computation.
[9] Navdeep Singh,et al. A Survey of Intrusion Detection Techniques , 2013 .
[10] Erwie Zahara,et al. A hybrid genetic algorithm and particle swarm optimization for multimodal functions , 2008, Appl. Soft Comput..
[11] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[12] Elsayed Radwan,et al. Intrusion Detection Using Rough Sets based Parallel Genetic Algorithm Hybrid Model , 2009 .
[13] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[14] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[15] Mehdi Medadian,et al. Combat with Black Hole attack in AODV routing protocol , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).
[16] Sunil Taneja,et al. A Survey of Routing Protocols in Mobile Ad Hoc Networks , 2010 .
[17] An Adaptive Blind Channel Estimation of OFDM System by Worst Case H∞ Approach , 2009 .
[18] Jiangye Yuan,et al. A modified particle swarm optimizer with dynamic adaptation , 2007, Appl. Math. Comput..
[19] Dong Seong Kim,et al. A Survey and Taxonomy of Lightweight Intrusion Detection Systems , 2012, J. Internet Serv. Inf. Secur..
[20] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[21] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[22] I. Raza,et al. A Trust based Security Framework for Pure AODV Network , 2007, 2007 International Conference on Information and Emerging Technologies.
[23] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[24] Huirong Fu,et al. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).
[25] Dan Boneh,et al. On genetic algorithms , 1995, COLT '95.