A cooperative intrusion detection scheme for clustered mobile ad hoc networks
暂无分享,去创建一个
Mznah Al-Rodhaan | Abdullah Al-Dhelaan | Hajar Al-Hujailan | A. Al-Dhelaan | Mznah Al-Rodhaan | Hajar Al-Hujailan
[1] Anupam Joshi,et al. On intrusion detection and response for mobile ad hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[2] Luciano Bononi,et al. A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks , 2006, ISC.
[3] Bharat Bhargava,et al. Defending against Collaborative Packet Drop Attacks on MANETs , 2009 .
[4] C Rajabhushanam,et al. Survey of Wireless MANET Application in Battlefield Operations , 2011 .
[5] Rong Wang,et al. A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks , 2008, KES-AMSTA.
[6] Zhe Li,et al. The Intrusion Detection Model Based on the Fuzzy Judgment in Ad Hoc Network , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[7] Ming-Yang Su,et al. Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes , 2010, WASA.
[8] Peter Xiaoping Liu,et al. Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.
[9] Aditya Goel,et al. Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol , 2009 .
[10] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[11] H. T. Mouftah,et al. AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[12] Rui Chen,et al. An Intrusion Detection Method for Ad Hoc Network Based on Class Association Rules Mining , 2009, 2009 Fourth International Conference on Frontier of Computer Science and Technology.
[13] Hecht-Nielsen. Theory of the backpropagation neural network , 1989 .
[14] Dharma P. Agrawal,et al. Security enhancements in AODV protocol for wireless ad hoc networks , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[15] S. Shanmugavel,et al. Providing Routing Security Using ROS Protocol in MANET and Performance Comparison with AODV , 2007 .
[16] Raja Datta,et al. Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.
[17] Min-Hua Shao,et al. Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[18] Yu Yao,et al. Research on the Security Scheme of Clustering in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Information Technology and Computer Science.
[19] Tai Hoon Kim. AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKS , 2008 .
[20] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[21] Arputharaj Kannan,et al. An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques , 2011 .
[22] R. Hecht-Nielsen,et al. Theory of the Back Propagation Neural Network , 1989 .
[23] Tarik Taleb,et al. Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.
[24] Hao Sun,et al. Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks , 2010, Int. J. Commun. Netw. Syst. Sci..