A survey on intrusion detection and prevention in wireless ad-hoc networks
暂无分享,去创建一个
Wali Khan Mashwani | Shafiullah Khan | Amjad Mehmood | Zeeshan Iqbal | Muhammad Altaf Khan | Khalid Khan | A. Mehmood | W. K. Mashwani | Shafiullah Khan | K. Khan | Z. Iqbal
[1] Farhan Abdel Fattah,et al. Distributed and Cooperative Hierarchical Intrusion Detection on MANETs , 2010 .
[2] A. Kamal,et al. Infrastructureless wireless networks: cluster-based architectures and protocols , 2004 .
[3] Marjan Kuchaki Rafsanjani,et al. An Optimal Method for Detecting Internal and External Intrusion in MANET , 2010, FGIT-FGCN.
[4] Wu Yue,et al. Distributed intrusion detection for mobile ad hoc networks , 2008 .
[5] Joan Feigenbaum,et al. A BGP-based mechanism for lowest-cost routing , 2002, PODC '02.
[6] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[7] Mohammad Teshnehlab,et al. Implementation of neural networks for intrusion detection in manet , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.
[8] A. Patcha,et al. A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[9] Jian Shen,et al. A Privacy-Preserving Health Data Aggregation Scheme , 2016, KSII Trans. Internet Inf. Syst..
[10] Min-Hua Shao,et al. Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[11] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[12] Klaus Julisch,et al. Data Mining for Intrusion Detection , 2002, Applications of Data Mining in Computer Security.
[13] Lixia Zhang,et al. A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.
[14] Aikaterini Mitrokotsa,et al. Intrusion Detection with Neural Networks and Watermarking Techniques for MANET , 2007, IEEE International Conference on Pervasive Services.
[15] Yu Liu,et al. A framework for intrusion detection systems by social network analysis methods in ad hoc networks , 2009, Secur. Commun. Networks.
[16] Hao Sun,et al. Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks , 2010, Int. J. Commun. Netw. Syst. Sci..
[17] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[18] Jingsha He,et al. A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[19] Satria Mandala,et al. A survey on MANET intrusion detection , 2008 .
[20] Nai-Wei Lo,et al. A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in MANET , 2013 .
[21] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[22] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[23] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[24] Azuan Ahmad,et al. CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism , 2017, Int. J. Commun. Networks Inf. Secur..
[25] Binod Kumar Pattanayak,et al. A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET , 2017, Int. J. Commun. Networks Inf. Secur..
[26] Tarik Taleb,et al. Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs) , 2010 .
[27] A. S. Sodiya,et al. A Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems , 2009 .
[28] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[29] Muhammad Zeeshan,et al. Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks , 2017, Int. J. Commun. Networks Inf. Secur..
[30] Z. A. Khan,et al. Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.
[31] John A. Clark,et al. Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.
[32] David Heckerman,et al. A Tutorial on Learning with Bayesian Networks , 1999, Innovations in Bayesian Networks.
[33] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[34] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[35] Calvin Ko,et al. Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[36] Arputharaj Kannan,et al. An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques , 2011 .
[37] Constantine N. Manikopoulos,et al. Architecture of the mobile ad-hoc network security (MANS) system , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[38] Bo-Chao Cheng,et al. A Context Adaptive Intrusion Detection System for MANET , 2011, Comput. Commun..
[39] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[40] R. S. Bhuvaneswaran,et al. Design of genetic algorithm based IDS for MANET , 2012, 2012 International Conference on Recent Trends in Information Technology.
[41] Ajay Kaul,et al. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..
[42] William H. Robinson,et al. A distributed intrusion detection system for resource-constrained devices in ad-hoc networks , 2010, Ad Hoc Networks.
[43] Nei Kato,et al. A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.
[44] N. Marchang,et al. A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[45] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[46] Karl N. Levitt,et al. A Specification-Based Intrusion Detection Model for OLSR , 2005, RAID.
[47] Prabir Bhattacharya,et al. A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..
[48] Jiankun Hu,et al. A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference , 2009, J. Netw. Comput. Appl..
[49] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..
[50] Raouf Boutaba,et al. Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection , 2011, Journal of Network and Systems Management.
[51] K. Manousakis,et al. A stochastic approximation approach for improving intrusion detection data fusion structures , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[52] Bruce Schneier,et al. Inside risks: risks of relying on cryptography , 1999, CACM.
[53] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[54] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[55] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[56] Magdy S. El-Soudani,et al. Security in Ad Hoc Networks: From Vulnerability to Risk Management , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[57] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[58] Marco Carvalho,et al. Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, ICCS.
[59] Christos Xenakis,et al. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..
[60] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[61] Peter Mell,et al. NIST Special Publication on Intrusion Detection Systems , 2001 .
[62] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[63] M. Farooq,et al. A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols , 2011, Appl. Soft Comput..
[64] Amitabh Mishra,et al. A novel intrusion detection approach for wireless ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[65] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[66] L Vokorokos,et al. Host-based intrusion detection system , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.
[67] Abolfazl Esfandi. Efficient anomaly intrusion detection system in adhoc networks by mobile agents , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[68] Mohammad S. Obaidat,et al. FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks , 2008, Comput. Commun..
[69] A. Kannan,et al. Multi-Layer Integrated Anomaly Intrusion Detection System for Mobile Adhoc Networks , 2007, 2007 International Conference on Signal Processing, Communications and Networking.
[70] Giovanni Vigna,et al. An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.
[71] M. Hemalatha,et al. Handling Intrusion Detection System using Snort Based Statistical Algorithm and Semi-supervised Approach , 2013 .
[72] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[73] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[74] Junshan Li,et al. A security architecture based on immune agents for MANET , 2010, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC).
[75] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[76] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[77] Hu Zhengbing,et al. Study of Intrusion Detection Systems (IDSs) in Network Security , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[78] Bangnan Xu,et al. The role of ad hoc networking in future wireless communications , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..
[79] Peyman Kabiri,et al. Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks , 2011, Int. J. Netw. Secur..
[80] Rituparna Chaki,et al. HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[81] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[82] Rong Luo,et al. Hide Markov Model Based Intrusion Detection and Response for Manets , 2010, 2010 Second International Conference on Information Technology and Computer Science.
[83] Dongwoo Kim,et al. Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks , 2006 .
[84] Srdjan Capkun,et al. GPS-free Positioning in Mobile Ad Hoc Networks , 2004, Cluster Computing.
[85] Daquan Gu,et al. A Novel Intrusion Detection Scheme Using Support Vector Machine Fuzzy Network for Mobile Ad Hoc Networks , 2009, 2009 Second Pacific-Asia Conference on Web Mining and Web-based Application.
[86] Mohamed Mezghiche,et al. A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[87] Andrew S. Miner,et al. Anomaly intrusion detection using one class SVM , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[88] K. Jayarajan,et al. A noncooperative game approach for intrusion detection in Mobile Adhoc networks , 2008, 2008 International Conference on Computing, Communication and Networking.
[89] Fagen Li,et al. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs , 2019, J. Syst. Archit..
[90] Steven Furnell,et al. Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks , 2008, Ad Hoc Networks.
[91] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[92] Geethapriya Thamilarasu,et al. A cross-layer game for energy-efficient jamming detection in ad hoc networks , 2012, Secur. Commun. Networks.
[93] Song Deng,et al. Distributed intrusion detection based on hybrid gene expression programming and cloud computing in a cyber physical power system , 2017 .
[94] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[95] Jung-Min Park,et al. A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..
[96] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[97] Zhihong Qian,et al. Mobile Agents-Based Intrusion Detection System for Mobile Ad Hoc Networks , 2010, 2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering.
[98] Udo W. Pooch,et al. Detecting black-hole attack in mobile ad hoc networks , 2003 .
[99] Amandeep Kaur,et al. A Review on Security Attacks in Mobile Ad-hoc Networks , 2014 .
[100] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[101] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[102] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[103] V. Rao Vemuri,et al. An application of principal component analysis to the detection and visualization of computer network attacks , 2006, Ann. des Télécommunications.
[104] Gary B. Wills,et al. Unsupervised Clustering Approach for Network Anomaly Detection , 2012, NDT.
[105] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[106] Jie Liu,et al. Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[107] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[108] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[109] Ge Yu,et al. Minimizing temperature and energy of real-time applications with precedence constraints on heterogeneous MPSoC systems , 2019, J. Syst. Archit..
[110] M. Wahengbam,et al. Intrusion Detection in MANET using fuzzy logic , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.
[111] Wenke Lee,et al. Agent-based cooperative anomaly detection for wireless ad hoc networks , 2006, 12th International Conference on Parallel and Distributed Systems - (ICPADS'06).
[112] Harold Joseph Highland,et al. The 17th NSCS abstructArtificial Intelligence and Intrusion Detection: Current and Future Directions : Jeremy Frank, University of California, Davis, CA , 1995 .
[113] Pietro Michiardi,et al. Security in ad hoc networks , 2003 .
[114] Hossam S. Hassanein,et al. Routeguard: an intrusion detection and response system for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[115] John A. Clark,et al. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks , 2009, ADHOCNETS.
[116] Srdjan Capkun,et al. Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..
[117] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[118] Nei Kato,et al. A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[119] Raja Datta,et al. Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.
[120] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[121] Guangjie Han,et al. Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[122] Cannady,et al. A Comparative Analysis of Current Intrusion Detection Technologies , 1996 .
[123] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[124] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[125] Ren-Fa Li,et al. Intrusion detection using mobile agent in ad-hoc networks , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[126] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[127] Lijun Qian,et al. Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..
[128] Ali Movaghar-Rahimabadi,et al. Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.
[129] Gisung Kim,et al. Self-adaptive and dynamic clustering for online anomaly detection , 2011, Expert Syst. Appl..
[130] Qi Zhang,et al. Indra: a peer-to-peer approach to network intrusion detection and prevention , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..
[131] S. Mary Saira Bhanu,et al. Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks , 2010, BAIP.
[132] A. Halim Zaim,et al. A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..
[133] Hitesh Tewari,et al. Real-time intrusion detection for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[134] Xin Fu,et al. Improving energy efficiency of mobile devices by characterizing and exploring user behaviors , 2019, J. Syst. Archit..
[135] Yang Xiao,et al. Integration of mobility and intrusion detection for wireless ad hoc networks , 2007, Int. J. Commun. Syst..
[136] Yang Li,et al. MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[137] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[138] Leandro Nunes de Castro,et al. Artificial Immune Systems: A Novel Approach to Pattern Recognition , 2002 .
[139] Rajesh Singh,et al. Simplified Approach for Data Warehouse Quality Measurement , 2010 .
[140] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[141] Prabir Bhattacharya,et al. A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[142] L. Javier García-Villalba,et al. On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments , 2006, PWC.
[143] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[144] Grant A. Jacoby,et al. Mobile Host-Based intrusion Detection and Attack Identification , 2007, IEEE Wireless Communications.
[145] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[146] Oludele Awodele,et al. A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS) , 2009 .
[147] Sanjay Kumar Jena,et al. Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks , 2011 .
[148] R. Sekar,et al. Experiences with Specification-Based Intrusion Detection , 2001, Recent Advances in Intrusion Detection.
[149] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[150] Kalamullah Ramli,et al. Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System , 2018, Int. J. Commun. Networks Inf. Secur..
[151] Wei Wang,et al. Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks , 2013, Inf. Sci..
[152] Tarek S. Sobh. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.
[153] Horst F. Wedde,et al. BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior , 2005, GECCO '05.
[154] M. E. Eissa,et al. Black Hole attack Detection using fuzzy based IDS , 2017, Int. J. Commun. Networks Inf. Secur..
[155] Houda Moudni,et al. Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks , 2018, Int. J. Commun. Networks Inf. Secur..
[156] Dirk Westhoff,et al. Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Proceedings IEEE 56th Vehicular Technology Conference.
[157] Udo W. Pooch,et al. Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.
[158] Prabir Bhattacharya,et al. A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[159] Aikaterini Mitrokotsa,et al. Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks , 2006 .
[160] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..