A Novel Framework of Dynamic Learning Based Intrusion Detection Approach in MANET
暂无分享,去创建一个
[1] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[2] Fatemeh Barani,et al. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms , 2012, ISC Int. J. Inf. Secur..
[3] Yi Lu,et al. Research on Network anomaly Detection Based on Clustering and Classifier , 2006, 2006 International Conference on Computational Intelligence and Security.
[4] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[5] P. Mohanakrishnan,et al. An Intuitive Signal Processing Approach for Temperature Fluctuations in Fuel Subassemblies , 2011 .
[6] Kumar Jain Yogendra. Intrusion Detection using Supervised Learning with Feature Set Reduction , 2011 .
[7] Udo W. Pooch,et al. Towards adaptive intrusion detection in mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[8] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[9] S. Mamatha,et al. BEHAVIORAL INTRUSION DETECTION IN MOBILE AD HOC NETWORKS , 2013 .
[10] Mahdi Abadi,et al. A dynamic clustering-based approach for anomaly detection in AODV-based MANETs , 2011, 2011 International Symposium on Computer Networks and Distributed Systems (CNDS).
[11] Nei Kato,et al. A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.
[12] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[13] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[14] Christos Dimitrakakis,et al. Intrusion detection in MANET using classification algorithms: The effects of cost and model selection , 2013, Ad Hoc Networks.
[15] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[16] Tony Thomas,et al. Anonymity, unlinkability and unobservability in mobile ad hoc networks , 2014, 2014 International Conference on Communication and Signal Processing.
[17] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[18] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .