Cluster based energy efficient authentication scheme for secure IDS over MANET
暂无分享,去创建一个
[1] Smita M. Nirkhi,et al. Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining , 2011 .
[2] Marianne Azer. Wormhole Attacks Mitigation in Ad Hoc Networks , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[3] Z. Narmawala. Survey of Applications of Network Coding in Wired and Wireless Networks , 2007 .
[4] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[5] Srivastava Sumit,et al. Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).
[6] Kenneth G. Paterson,et al. Key Refreshing in Identity-Based Cryptography and its Applications in MANETs , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[7] Sajjad Abazari Aghdam,et al. Collaborative techniques for detecting wormhole attack in MANETs , 2011, 2011 International Conference on Research and Innovation in Information Systems.
[8] Durgesh Kumar Mishra,et al. Security issues in MANET: A review , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).
[9] A. Kumar,et al. A complete, efficient and lightweight cryptography solution for resource contrainst Mobile Ad-Hoc Networks , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[10] M. K. Verma,et al. A survey on: An analysis of secure routing of volatile nodes in MANET , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).
[11] Robert C. Green,et al. Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid , 2011, 2011 IEEE Power and Energy Society General Meeting.
[12] Kalyani C. Waghmare,et al. Intrusion Detection System Using Data Mining Technique : Support Vector Machine , 2013 .
[13] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[14] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[15] Sajal K. Das,et al. A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.
[16] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[17] K. Selvakumar,et al. A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET) , 2014, Int. J. Parallel Emergent Distributed Syst..
[18] Shailesh Singh Panwar,et al. DATA REDUCTION TECHNIQUES TO ANALYZE NSL-KDD DATASET , 2014 .
[19] Taran Singh Bharati,et al. Secure intrusion detection system for mobile adhoc networks , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).
[20] Dahai Du,et al. A dynamic key management scheme for MANETs , 2011, Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference.