MANET: Securing AODV Based on a Combined Immune Theories Algorithm (CITA)
暂无分享,去创建一个
Mohammed Bouhorma | Anass Khannous | Fatiha Elouaai | Anass Rghioui | M. Bouhorma | Anass Khannous | F. Elouaai | Anass Rghioui
[1] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[2] Polly Matzinger,et al. Friendly and dangerous signals: is the tissue in control? , 2007, Nature Immunology.
[3] Yoshiteru Ishida. Immunity-Based Systems: A Design Perspective , 2010 .
[4] Robert A. Scholtz,et al. Performance Analysis of , 1998 .
[5] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[7] Jonathan Timmis. Artificial immune systems : a novel data analysis technique inspired by the immune network theory , 2000 .
[8] P. Matzinger,et al. An innate sense of danger. , 1998, Seminars in immunology.
[9] Mark A. Gregory,et al. A review of artificial immune system based security frameworks for MANET , 2016 .
[10] Gu Ji-yan,et al. The Dendritic Cell Algorithm , 2011 .
[11] Julie Greensmith,et al. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.
[12] Davide Cerri,et al. Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.
[13] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[14] Raed A. Alsaqour,et al. Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET , 2011, ICSECS.
[15] Mohammed Bouhorma,et al. A New Approach to Artificial Immune System for Intrusion Detection of the Mobile Ad Hoc Networks , 2014 .
[16] Maha Abdelhaq,et al. Detecting Sleep Deprivation Attack over MANET Using a Danger Theory -Based Algorithm , 2011 .
[17] Senhua Yu,et al. MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.