ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Distributed intrusion detection scheme for wireless Ad-Hoc Networks: A review
2012 CSI Sixth International Conference on Software Engineering (CONSEG)
◽
10.1109/conseg.2012.6349483
◽
2012
◽
Author(s):
Rupali Phatak
◽
Durgesh Kumar Mishra
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Detection Scheme
◽
Distributed Intrusion Detection
◽
Hoc Networks
Start Chat
Download Full-text
Related Documents
Cited By
References
A distributed intrusion detection scheme for wireless ad hoc networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing - SAC '12
◽
10.1145/2245276.2245382
◽
2012
◽
Cited By ~ 3
Author(s):
Anderson Morais
◽
Ana Cavalli
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Detection Scheme
◽
Distributed Intrusion Detection
◽
Hoc Networks
Start Chat
Download Full-text
A distributed intrusion detection system for wireless ad hoc networks
2008 16th IEEE International Conference on Networks
◽
10.1109/icon.2008.4772624
◽
2008
◽
Cited By ~ 11
Author(s):
Jaydip Sen
◽
Arijit Ukil
◽
Debasish Bera
◽
Arpan Pal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Distributed Intrusion Detection
◽
Distributed Intrusion Detection System
◽
Hoc Networks
Start Chat
Download Full-text
A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks
31st Annual International Computer Software and Applications Conference - Vol. 2 - (COMPSAC 2007)
◽
10.1109/compsac.2007.18
◽
2007
◽
Cited By ~ 8
Author(s):
Yingfang Fu
◽
Jingsha He
◽
Guorui Li
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Scheme
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A discounted stochastic game approach to intrusion detection in wireless ad hoc networks
2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)
◽
10.1109/cce.2014.6916760
◽
2014
◽
Cited By ~ 1
Author(s):
Hussein Moosavi
◽
Francis Minhthang Bui
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Stochastic Game
◽
Hoc Networks
Start Chat
Download Full-text
Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
Information Fusion
◽
10.1016/j.inffus.2007.03.001
◽
2008
◽
Vol 9
(1)
◽
pp. 96-119
◽
Cited By ~ 45
Author(s):
João B.D. Cabrera
◽
Carlos Gutiérrez
◽
Raman K. Mehra
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Ensemble Methods
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Self-Organizing Distributed Intrusion Detection in Mobile Ad Hoc Networks
Advances in Soft Computing - Soft Computing as Transdisciplinary Science and Technology
◽
10.1007/3-540-32391-0_31
◽
2007
◽
pp. 233-242
Author(s):
James Cannady
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Self Organizing
Start Chat
Download Full-text
SVM-based intrusion detection system for wireless ad hoc networks
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
◽
10.1109/vetecf.2003.1285404
◽
2003
◽
Cited By ~ 11
Author(s):
Hongmei Deng
◽
Qing-An Zeng
◽
D.P. Agrawal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Start Chat
Download Full-text
A Specification-Based Intrusion Detection Model for Wireless Ad Hoc Networks
2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications
◽
10.1109/ibica.2012.34
◽
2012
◽
Cited By ~ 5
Author(s):
Hsiao-Ching Lin
◽
Ming-Kung Sun
◽
Han-Wei Huang
◽
Chin-Yang Henry Tseng
◽
Hui-Tang Lin
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Detection Model
◽
Hoc Networks
Start Chat
Download Full-text
A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
Ad Hoc Networks
◽
10.1016/j.adhoc.2009.08.002
◽
2010
◽
Vol 8
(3)
◽
pp. 253-266
◽
Cited By ~ 53
Author(s):
Adrian P. Lauf
◽
Richard A. Peters
◽
William H. Robinson
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Resource Constrained
◽
Distributed Intrusion Detection
◽
Hoc Networks
◽
Resource Constrained Devices
◽
Constrained Devices
Start Chat
Download Full-text
Challenges in intrusion detection for wireless ad-hoc networks
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
◽
10.1109/saintw.2003.1210188
◽
2003
◽
Cited By ~ 63
Author(s):
P. Brutch
◽
C. Ko
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close