An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks
暂无分享,去创建一个
[1] Mahdieh Ghazvini,et al. A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2015, Wireless Networks.
[2] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[3] Ameeta Seehra. Detection and Prevention of Black-Hole Attack in MANETS , 2014 .
[4] Athanasios V. Vasilakos,et al. Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter , 2015, IEEE Transactions on Information Forensics and Security.
[5] R. H. Jhaveri,et al. A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[6] Shahram Behzad,et al. An Improvement Over Threads Communications on Multi-Core Processors , 2019, ArXiv.
[7] Can Zhang,et al. Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network , 2014, ICA3PP.
[8] Syed Jalal Ahmad,et al. Detection of Black Hole Attack Using Code Division Security Method , 2015 .
[9] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[10] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[11] Reza Fotohi,et al. An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.
[12] Shahram Jamali,et al. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .
[13] Shahram Jamali,et al. A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .
[14] Mazdak Zamani,et al. A secure model for prevention of black hole attack in wireless mobile ad hoc networks , 2013 .
[15] Shahram Jamali,et al. An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .
[16] Shahram Jamali,et al. Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols , 2013 .
[17] Athanasios V. Vasilakos,et al. Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.
[18] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[19] Jamali Shahram,et al. A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .
[20] Reza Fotohi,et al. A Cluster Based Job Scheduling Algorithm for Grid Computing , 2013 .
[21] Reza Fotohi,et al. A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.
[22] R. Saravanan,et al. A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.
[23] Mehdi Medadian,et al. Combat with Black hole attack in AODV routing protocol in MANET , 2009, 2009 First Asian Himalayas International Conference on Internet.
[24] Athanasios V. Vasilakos,et al. Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.
[25] Vrinda Tokekar,et al. Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[26] Weijie Liu,et al. A cluster-based countermeasure against blackhole attacks in MANETs , 2014, Telecommun. Syst..
[27] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[28] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.
[29] Shahram Jamali,et al. A Simulative Comparison of DSDV and OLSR Routing Protocols , 2012 .
[30] Huirong Fu,et al. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).
[31] Shahram Behzad,et al. Queue based Job Scheduling algorithm for Cloud computing , 2013 .
[32] Shahram Jamali,et al. Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .
[33] Manish Sharma,et al. Performance evaluation aodv , 2012 .
[34] Shahram Jamali,et al. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.
[35] Athanasios V. Vasilakos,et al. A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.
[36] Shahram Behzad,et al. Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .
[37] Satria Mandala,et al. Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks , 2014, SSCC.