Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule
暂无分享,去创建一个
[1] Shadi Aljawarneh,et al. Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency , 2017, Sustain. Comput. Informatics Syst..
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Mario Gerla,et al. On-demand routing in large ad hoc wireless networks with passive clustering , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[4] Sujanavan Tiruvayipati,et al. Anomaly Detection System in a Cluster Based MANET , 2017 .
[5] Hesham A. Ali,et al. An Administrative Cluster-based Cooperative Caching (ACCC) strategy for Mobile Ad Hoc Networks , 2016, J. Netw. Comput. Appl..
[6] Jiamin Li,et al. Fuzzy Clustering Algorithms — Review of the Applications , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).
[7] Govindaraju Radhamani,et al. Enhanced ANTSEC framework with cluster based cooperative caching in mobile ad hoc networks , 2015, Journal of Communications and Networks.
[8] Qinglin Zhao,et al. Support for spot virtual machine purchasing simulation , 2018, Cluster Computing.
[9] Sushanta Karmakar,et al. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation , 2016 .
[10] P. Kuppusamy,et al. Cluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network , 2012 .
[11] Geoffrey Ye Li,et al. A survey of energy-efficient wireless communications , 2013, IEEE Communications Surveys & Tutorials.
[12] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[13] Ahmet Rizaner,et al. A novel support vector machine based intrusion detection system for mobile ad hoc networks , 2017, Wireless Networks.
[14] Sajal K. Das,et al. A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.
[15] S. Saravana Kumar,et al. Dynamic anomaly detection using cross layer security in MANET , 2017, Comput. Electr. Eng..
[16] Kathiravan Kannan,et al. Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks , 2016 .
[17] Deborah Estrin,et al. Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table , 2003, Mob. Networks Appl..
[18] Vaduvur Bharghavan,et al. CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..
[19] Saravanan Kumarasamy,et al. Cluster Based Cost Efficient Intrusion Detection System For Manet , 2013, ArXiv.
[20] Chung-Ta King,et al. On state maintenance in cluster-based mobile ad-hoc networks , 2017, Ad Hoc Networks.
[21] Karl N. Levitt,et al. Distributed intrusion detection models for mobile ad hoc networks , 2006 .
[22] Naonori Kakimura,et al. Maximum lifetime coverage problem with battery recovery effect , 2018, Sustain. Comput. Informatics Syst..
[23] Ravinder Singh,et al. Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET , 2017, Cluster Computing.
[24] Wen-Kuang Kuo,et al. Energy Efficiency Optimization for Mobile Ad Hoc Networks , 2016, IEEE Access.
[25] Saswati Sarkar,et al. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).