Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Published 2016 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Authors
Keywords
-
Journal
Security and Communication Networks
Volume 9, Issue 14, Pages 2484-2556
Publisher
Wiley
Online
2016-05-06
DOI
10.1002/sec.1484
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A specification-based intrusion detection engine for infrastructure-less networks
- (2014) Christoforos Panos et al. COMPUTER COMMUNICATIONS
- A survey of intrusion detection in wireless network applications
- (2014) Robert Mitchell et al. COMPUTER COMMUNICATIONS
- Game theory meets network security and privacy
- (2013) Mohammad Hossein Manshaei et al. ACM COMPUTING SURVEYS
- An intrusion detection & adaptive response mechanism for MANETs
- (2013) Adnan Nadeem et al. Ad Hoc Networks
- Modified DSR protocol for detection and removal of selective black hole attack in MANET
- (2013) M. Mohanapriya et al. COMPUTERS & ELECTRICAL ENGINEERING
- On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
- (2013) Abror Abduvaliyev et al. IEEE Communications Surveys and Tutorials
- A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks
- (2013) Adnan Nadeem et al. IEEE Communications Surveys and Tutorials
- A Survey of Intrusion Detection Systems in Wireless Sensor Networks
- (2013) Ismail Butun et al. IEEE Communications Surveys and Tutorials
- Algorithms for a distributed IDS in MANETs
- (2013) P.M. Mafra et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
- (2012) Aikaterini Mitrokotsa et al. Ad Hoc Networks
- CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
- (2012) Wenjia Li et al. DISTRIBUTED AND PARALLEL DATABASES
- EAACK—A Secure Intrusion-Detection System for MANETs
- (2012) Elhadi M. Shakshuki et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks
- (2012) Wei Wang et al. INFORMATION SCIENCES
- A survey of Intrusion Detection Systems for Wireless Sensor Networks
- (2012) Ashfaq Hussain Farooqi et al. International Journal of Ad Hoc and Ubiquitous Computing
- Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
- (2012) Abderrahmane Baadache et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An intrusion detection and prevention system in cloud computing: A systematic review
- (2012) Ahmed Patel et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Intrusion detection system: A comprehensive review
- (2012) Hung-Jen Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of intrusion detection techniques in Cloud
- (2012) Chirag Modi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Evaluation of classification algorithms for intrusion detection in MANETs
- (2012) Sergio Pastrana et al. KNOWLEDGE-BASED SYSTEMS
- A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols
- (2011) N. Mazhar et al. APPLIED SOFT COMPUTING
- Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
- (2011) Sevil Sen et al. Computer Networks
- Distributed Court System for intrusion detection in mobile ad hoc networks
- (2011) Da Zhang et al. COMPUTERS & SECURITY
- Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
- (2011) Ming Yang Su International Journal of Ad Hoc and Ubiquitous Computing
- A cross-layer game for energy-efficient jamming detection in ad hoc networks
- (2011) G. Thamilarasu et al. Security and Communication Networks
- An information theoretic approach for feature selection
- (2011) Gulshan Kumar et al. Security and Communication Networks
- A Context Adaptive Intrusion Detection System for MANET
- (2010) Bo-Chao Cheng et al. COMPUTER COMMUNICATIONS
- Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
- (2010) Ming-Yang Su COMPUTER COMMUNICATIONS
- A survey on bio-inspired networking
- (2010) Falko Dressler et al. Computer Networks
- A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
- (2010) Christos Xenakis et al. COMPUTERS & SECURITY
- A cost-based analysis of intrusion detection system configuration under active or passive response
- (2010) Wei T. Yue et al. DECISION SUPPORT SYSTEMS
- A distributed sinkhole detection method using cluster analysis
- (2010) Woochul Shim et al. EXPERT SYSTEMS WITH APPLICATIONS
- Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA
- (2010) John Felix Charles Joseph et al. IEEE Transactions on Dependable and Secure Computing
- On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks
- (2010) Rajendra V. Boppana et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks
- (2010) Jin-Hee Cho et al. IEEE TRANSACTIONS ON RELIABILITY
- Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption
- (2010) S. Umang et al. IET Communications
- Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
- (2010) Carol Fung et al. Journal of Network and Systems Management
- Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks
- (2010) Jin-Hee Cho et al. PERFORMANCE EVALUATION
- TOGBAD-an approach to detect routing attacks in tactical environments
- (2010) Elmar Gerhards-Padilla et al. Security and Communication Networks
- Anomaly detection
- (2009) Varun Chandola et al. ACM COMPUTING SURVEYS
- A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
- (2009) Adrian P. Lauf et al. Ad Hoc Networks
- A cooperative-sinkhole detection method for mobile ad hoc networks
- (2009) Gisung Kim et al. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS
- The use of computational intelligence in intrusion detection systems: A review
- (2009) Shelly Xiaonan Wu et al. APPLIED SOFT COMPUTING
- CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS
- (2009) John Felix Charles Joseph et al. Computer Networks
- A taxonomy of biologically inspired research in computer networking
- (2009) Michael Meisel et al. Computer Networks
- WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks
- (2009) Ming-Yang Su COMPUTERS & SECURITY
- A survey of coordinated attacks and collaborative intrusion detection
- (2009) Chenfeng Vincent Zhou et al. COMPUTERS & SECURITY
- Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks
- (2009) Jie Liu et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
- (2009) Xuan Dau Hoang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- LIDF: Layered intrusion detection framework for ad-hoc networks
- (2008) Nikos Komninos et al. Ad Hoc Networks
- FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks
- (2008) Chandrasekar Ramachandran et al. COMPUTER COMMUNICATIONS
- Anomaly-based network intrusion detection: Techniques, systems and challenges
- (2008) P. García-Teodoro et al. COMPUTERS & SECURITY
- A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks
- (2008) H. Nakayama et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Distributed intrusion detection for mobile ad hoc networks
- (2008) Yi Ping et al. Journal of Systems Engineering and Electronics
- Toward a cross-layer monitoring process for mobilead hocnetworks
- (2008) Abderrezak Rachedi et al. Security and Communication Networks
- Threshold-based intrusion detection in ad hoc networks and secure AODV
- (2007) A. Patwardhan et al. Ad Hoc Networks
- Collaborative techniques for intrusion detection in mobile ad-hoc networks
- (2007) Ningrinla Marchang et al. Ad Hoc Networks
- Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
- (2007) S.A. Razak et al. Ad Hoc Networks
- MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks
- (2007) Issa Khalil et al. Ad Hoc Networks
- Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
- (2007) Imran Raza et al. COMPUTER COMMUNICATIONS
- A game-theoretic intrusion detection model for mobile ad hoc networks
- (2007) Hadi Otrok et al. COMPUTER COMMUNICATIONS
- Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
- (2007) João B.D. Cabrera et al. Information Fusion
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now