In this paper, we present two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which ea
β¦ LIBER β¦
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
β Scribed by Sevil Sen; John A. Clark
- Book ID
- 113550956
- Publisher
- Elsevier Science
- Year
- 2011
- Tongue
- English
- Weight
- 628 KB
- Volume
- 55
- Category
- Article
- ISSN
- 1389-1286
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Collaborative techniques for intrusion d
β
Ningrinla Marchang; Raja Datta
π
Article
π
2008
π
Elsevier Science
π
English
β 258 KB
An evolutionary computation approach for
β
D. GutiΓ©rrez-Reina; S.L. Toral MarΓn; P. Johnson; F. Barrero
π
Article
π
2012
π
Elsevier Science
π
English
β 653 KB
Distributed Court System for intrusion d
β
Da Zhang; Chai Kiat Yeo
π
Article
π
2011
π
Elsevier Science
π
English
β 985 KB
A game-theoretic intrusion detection mod
β
Hadi Otrok; Noman Mohammed; Lingyu Wang; Mourad Debbabi; Prabir Bhattacharya
π
Article
π
2008
π
Elsevier Science
π
English
β 310 KB
Ensemble methods for anomaly detection a
Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
β
JoΓ£o B.D. Cabrera; Carlos GutiΓ©rrez; Raman K. Mehra
π
Article
π
2008
π
Elsevier Science
π
English
β 666 KB
Friend-assisted intrusion detection and
β
S.A. Razak; S.M. Furnell; N.L. Clarke; P.J. Brooke
π
Article
π
2008
π
Elsevier Science
π
English
β 399 KB
Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in