PROPOSING A DISTRIBUTED MODEL FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK USING NEURAL FUZZY INTERFACE
暂无分享,去创建一个
[1] Yang Li,et al. MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[2] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[3] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[4] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[5] Ji Luo,et al. An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks , 2006, Fuzzy Sets Syst..
[6] Sehun Kim,et al. A cooperative-sinkhole detection method for mobile ad hoc networks , 2010 .
[7] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[8] Erman Ayday,et al. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks , 2010, Ad Hoc Networks.
[9] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[10] Christos Xenakis,et al. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..
[11] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[12] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[13] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[14] Christos Douligeris,et al. LIDF: Layered intrusion detection framework for ad-hoc networks , 2009, Ad Hoc Networks.
[15] Shiyong Zhang,et al. Flooding attack and defence in Ad hoc networks , 2006 .
[16] Djamel Djenouri,et al. On Securing MANET Routing Protocol Against Control Packet Dropping , 2007, IEEE International Conference on Pervasive Services.
[17] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[18] Ming-Yang Su,et al. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..
[19] Christos Douligeris,et al. Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.
[20] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[21] Nick Antonopoulos,et al. Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks , 2010, Comput. Commun..
[22] S. A. M. Makki,et al. The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV) , 2004, Security and Management.
[23] Jyh-Shing Roger Jang,et al. ANFIS: adaptive-network-based fuzzy inference system , 1993, IEEE Trans. Syst. Man Cybern..