Efficient Intrusion detection of malicious node using Bayesian Hybrid Detection in MANET
暂无分享,去创建一个
[1] Xian-Wei Zhou,et al. A cooperative differential game model based on transmission rate in wireless networks , 2010, Oper. Res. Lett..
[2] Victor C. M. Leung,et al. Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.
[3] Prabir Bhattacharya,et al. A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..
[4] Zhu Han,et al. Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[5] V. Sangeetha,et al. ZIDS: Zonal-based Intrusion Detection System for studying the malicious node behaviour in MANET , 2015, 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT).
[6] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[7] Benxiong Huang,et al. COSR: A Reputation-Based Secure Route Protocol in MANET , 2010, EURASIP J. Wirel. Commun. Netw..
[8] Paolo Santi,et al. A Two-Dimensional Geometry-Based Stochastic Model , 2012, IEEE Transactions on Wireless Communications.
[9] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[10] Petteri Nurmi,et al. Modelling routing in wireless ad hoc networks with dynamic Bayesian games , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[11] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[12] Chun Chen,et al. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.
[13] Marjan Kuchaki Rafsanjani,et al. An Optimal Method for Detecting Internal and External Intrusion in MANET , 2010, FGIT-FGCN.
[14] Peter Xiaoping Liu,et al. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[15] Jie Liu,et al. Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[16] Yunhao Liu,et al. Energy-Efficient Neighbor Discovery in Mobile Ad Hoc and Wireless Sensor Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[17] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[18] N. Marchang,et al. A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[19] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[20] F. Richard Yu,et al. A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.