ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A distributed intrusion detection system for wireless ad hoc networks
2008 16th IEEE International Conference on Networks
◽
10.1109/icon.2008.4772624
◽
2008
◽
Cited By ~ 11
Author(s):
Jaydip Sen
◽
Arijit Ukil
◽
Debasish Bera
◽
Arpan Pal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Distributed Intrusion Detection
◽
Distributed Intrusion Detection System
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
A Novel Distributed Intrusion Detection System for Vehicular Ad Hoc Networks
International Journal of Advanced Computer Science and Applications
◽
10.14569/ijacsa.2015.060414
◽
2015
◽
Vol 6
(4)
◽
Cited By ~ 2
Author(s):
Leandros A.
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Intrusion Detection System
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Detection System
◽
Distributed Intrusion Detection
◽
Distributed Intrusion Detection System
◽
Hoc Networks
Download Full-text
A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET)
International Journal of Parallel Emergent and Distributed Systems
◽
10.1080/17445760.2013.773001
◽
2013
◽
Vol 29
(1)
◽
pp. 90-103
◽
Cited By ~ 10
Author(s):
G. Indirani
◽
K. Selvakumar
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Distributed Intrusion Detection System
◽
Hoc Networks
Download Full-text
SVM-based intrusion detection system for wireless ad hoc networks
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
◽
10.1109/vetecf.2003.1285404
◽
2003
◽
Cited By ~ 11
Author(s):
Hongmei Deng
◽
Qing-An Zeng
◽
D.P. Agrawal
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Download Full-text
A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
Ad Hoc Networks
◽
10.1016/j.adhoc.2009.08.002
◽
2010
◽
Vol 8
(3)
◽
pp. 253-266
◽
Cited By ~ 53
Author(s):
Adrian P. Lauf
◽
Richard A. Peters
◽
William H. Robinson
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Resource Constrained
◽
Distributed Intrusion Detection
◽
Hoc Networks
◽
Resource Constrained Devices
◽
Constrained Devices
Download Full-text
Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks
2008 International Conference on Signal Processing, Communications and Networking
◽
10.1109/icscn.2008.4447185
◽
2008
◽
Cited By ~ 8
Author(s):
S. Bose
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Denial Of Service
◽
Denial Of Service Attacks
◽
Cross Layer
◽
Hoc Networks
Download Full-text
A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks
2012 International Conference on Systems and Informatics (ICSAI2012)
◽
10.1109/icsai.2012.6223291
◽
2012
◽
Cited By ~ 1
Author(s):
Selvamani K
◽
Anbuchelian S
◽
Kanimozhi S
◽
Elakkiya R
◽
Bose S
◽
...
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Resource Consumption
◽
Hybrid Framework
◽
Hoc Networks
Download Full-text
Intrusion detection system in wireless ad-hoc networks based on mobile agent technology
2010 2nd International Conference on Computer Engineering and Technology
◽
10.1109/iccet.2010.5486031
◽
2010
◽
Cited By ~ 1
Author(s):
Amira Hamdi Shabaan
◽
Hesham ElZouka
◽
Mohamed Abou ElNasr
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Mobile Agent
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Agent Technology
◽
Hoc Networks
Download Full-text
TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks
Computer Information Systems and Industrial Management - Lecture Notes in Computer Science
◽
10.1007/978-3-642-33260-9_6
◽
2012
◽
pp. 80-91
◽
Cited By ~ 5
Author(s):
Novarun Deb
◽
Nabendu Chaki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Download Full-text
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks
Computational Intelligence and Security - Lecture Notes in Computer Science
◽
10.1007/11596981_31
◽
2005
◽
pp. 204-211
◽
Cited By ~ 2
Author(s):
Ki-Won Yeom
◽
Ji-Hyung Park
Keyword(s):
Immune System
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Intrusion Detection System
◽
Mobile Agents
◽
Ad Hoc
◽
Detection System
◽
Collaborative Intrusion Detection
◽
Hoc Networks
Download Full-text
Enhancing vehicular ad-hoc networks security using intrusion detection system techniques
Proceedings of the 4th International Conference on Smart City Applications - SCA '19
◽
10.1145/3368756.3369017
◽
2019
◽
Author(s):
Meriem Houmer
◽
Moulay Lahcen Hasnaoui
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Intrusion Detection System
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Detection System
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close