𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks

✍ Scribed by Sevil Sen; John A. Clark


Book ID
113550956
Publisher
Elsevier Science
Year
2011
Tongue
English
Weight
628 KB
Volume
55
Category
Article
ISSN
1389-1286

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Collaborative techniques for intrusion d
✍ Ningrinla Marchang; Raja Datta πŸ“‚ Article πŸ“… 2008 πŸ› Elsevier Science 🌐 English βš– 258 KB

In this paper, we present two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which ea

Friend-assisted intrusion detection and
✍ S.A. Razak; S.M. Furnell; N.L. Clarke; P.J. Brooke πŸ“‚ Article πŸ“… 2008 πŸ› Elsevier Science 🌐 English βš– 399 KB

Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in