Implementation of A3ACKs Intrusion Detection System under Various Mobility Speeds
暂无分享,去创建一个
Tarek R. Sheltami | Elhadi M. Shakshuki | Abdulsalam Basabaa | E. Shakshuki | T. Sheltami | Abdulsalam Basabaa
[1] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[2] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[3] Geetha Jayakumar,et al. Ad Hoc Mobile Wireless Networks Routing Protocols - A Review , 2007 .
[4] Tarek R. Sheltami,et al. Detecting misbehaving nodes in MANETs , 2010, iiWAS.
[5] H. T. Mouftah,et al. AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[6] Nidal Nasser,et al. Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[7] Michel Barbeau,et al. Principles of ad hoc networking , 2007 .
[8] Ashraf S. Hasan Mahmoud,et al. Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.
[9] Pramod K. Varshney,et al. TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[10] R. Dorf,et al. The handbook of ad hoc wireless networks , 2003 .
[11] K. Selvakumar,et al. Eaack- A Secure Intrusion Detection System for Manets , 2015 .
[12] Neeraj Kumar,et al. Security and Trust Management in MANET , 2011 .
[13] S Neelavathy Pari,et al. Mitigating routing misbehaviour in self organizing mobile ad hoc network using K-neighbourhood local reputation system , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[14] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[15] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[16] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[17] Tarek R. Sheltami,et al. Detecting Forged Acknowledgements in MANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.
[18] Ramin Hekmat,et al. Ad-hoc networks - fundamental properties and network topologies , 2006 .
[19] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[20] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.