An energy-based weight selection algorithm of monitor node in MANETs
暂无分享,去创建一个
Yongcheng Li | Yao Yu | Ting Cao | Jinfeng Gao | Ting Cao | Yao Yu | Jinfeng Gao | Yongcheng Li
[1] Keqiu Li,et al. Heterogeneous ad hoc networks: Architectures, advances and challenges , 2017, Ad Hoc Networks.
[2] Sunil Kumar,et al. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges , 2016, Secur. Commun. Networks.
[3] M. P. Sebastian,et al. (k, r)-Dominating set-based, weighted and adaptive clustering algorithms for mobile ad hoc networks , 2011, IET Commun..
[4] Dae-Won Kim,et al. Convex optimization approach for multi-label feature selection based on mutual information , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).
[5] Evangelos P. Markatos,et al. LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System , 2016, IEEE Transactions on Emerging Topics in Computing.
[6] Riccardo Muradore,et al. Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security , 2015, IEEE Transactions on Industrial Informatics.
[7] Alan Holt,et al. Energy consumption of mobile agents in a wireless ad hoc network environment , 2013, IET Networks.
[8] Ing-Ray Chen,et al. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks , 2013, IEEE Transactions on Network and Service Management.
[9] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[10] Prabir Bhattacharya,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .
[11] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[12] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[13] Tae-Hyung Kim,et al. A distributed energy-efficient clustering scheme for deploying IDS in MANETs , 2013, Telecommun. Syst..