Journal articles on the topic 'Types of MANET and IDS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Types of MANET and IDS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "DESIGNING SECURE MULTICASTING ROUTING ALGORITHMS IN MANET USING IDS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 407–10. https://doi.org/10.5281/zenodo.573517.
Full textMrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "INTRUSION DETECTION SYSTEM FOR MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 402–6. https://doi.org/10.5281/zenodo.581556.
Full textK.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.
Full textDixit, Shruti, Navneet Kaur, and Shalini Shahhay. "Intrusion Detection System Based on Particle Swarm Optimization in Mobile Ad-hoc Network: A Survey." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 89–93. https://doi.org/10.5281/zenodo.10718959.
Full textJavidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.
Full textEiny, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network." Wireless Communications and Mobile Computing 2021 (June 15, 2021): 1–12. http://dx.doi.org/10.1155/2021/6648351.
Full textK.Thamizhmaran. "Non-Base-Station based Wireless Communication in MANET using Hybrid Routing." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2025): 8–14. https://doi.org/10.5281/zenodo.14718160.
Full textK., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.
Full textPOOJA, L.CHELANI, C.KHAKE USHA, and S.LOKHANDE VANDANA. "TECHNIQUES FOR PREVENTING AND DETECTING MISBEHAVING NODES IN MANET: A SURVEY." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 4 (2017): 204–9. https://doi.org/10.5281/zenodo.1460111.
Full textMarepalli, Radha, and Rao C.V.Guru. "PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HOLE ATTACK:ISSUES AND CHALLENGES." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 7, no. 2 (2020): 1–8. https://doi.org/10.5281/zenodo.3980700.
Full textYassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.
Full textKhan, Zeeshan Ali, and Peter Herrmann. "Recent Advancements in Intrusion Detection Systems for the Internet of Things." Security and Communication Networks 2019 (July 3, 2019): 1–19. http://dx.doi.org/10.1155/2019/4301409.
Full textG., S. Sivagamasundari, and Thamizhmaran K. "Security Attack for Mobile Ad hoc Network using Hybrid Protocol called ZHLP." Journal of Emerging Trends in Electrical Engineering 4, no. 3 (2022): 1–6. https://doi.org/10.5281/zenodo.7349735.
Full textTalukdar, Md Ibrahim, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, and Amjed Sid Ahmed. "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature." Wireless Communications and Mobile Computing 2021 (March 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/6693316.
Full textVarule, Kavita, and Sachin Bojewar. "RWD based IDS for MANET." International Journal of Computer Applications 124, no. 13 (2015): 9–13. http://dx.doi.org/10.5120/ijca2015905722.
Full textRanjani, R., and JJayala kshmi. "Comparative Study of Ids for Manet." IOSR Journal of Computer Engineering 16, no. 2 (2014): 14–18. http://dx.doi.org/10.9790/0661-162121418.
Full textRavi, N., and G. Ramachandran. "A robust intrusion detection system using machine learning techniques for MANET." International Journal of Knowledge-based and Intelligent Engineering Systems 24, no. 3 (2020): 253–60. http://dx.doi.org/10.3233/kes-200047.
Full textRathish, CR, K. Karpagavadivu, P. Sindhuja, and A. Kousalya. "A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET." Information Technology and Control 50, no. 1 (2021): 45–54. http://dx.doi.org/10.5755/j01.itc.50.1.25002.
Full textKim, Young-Dong. "IDS Performance on MANET with Packet Aggregation Transmissions." Journal of the Korea institute of electronic communication sciences 9, no. 6 (2014): 695–701. http://dx.doi.org/10.13067/jkiecs.2014.9.6.695.
Full textAnilkumar, Prajeena, and Dr S. Malathy. "An Energy Efficient Acknowledgement Based Ids For Manet." IOSR Journal of Electronics and Communication Engineering 9, no. 3 (2014): 100–106. http://dx.doi.org/10.9790/2834-0933100106.
Full textGarg, Monika, Karanvir Kaur, and Simerpreet Kaur. "Using 3GPP- A Secure IDS for MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.
Full textRath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.
Full textSuganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.
Full textAli Zardari, Zulfiqar, Jingsha He, Nafei Zhu, et al. "A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs." Future Internet 11, no. 3 (2019): 61. http://dx.doi.org/10.3390/fi11030061.
Full textGandage, S. C., and A. Kumar. "DESIGN AND DEVELOPMENT OF IDS IN MANET USING PSO." Advances in Mathematics: Scientific Journal 9, no. 7 (2020): 5001–9. http://dx.doi.org/10.37418/amsj.9.7.65.
Full textKim, Young-Dong. "Performance Evaluation of IDS on MANET under Grayhole Attack." Journal of the Korea institute of electronic communication sciences 11, no. 11 (2016): 1077–82. http://dx.doi.org/10.13067/jkiecs.2016.11.11.1077.
Full textCHENG, B. C., H. CHEN, and R. Y. TSENG. "A Good IDS Response Protocol of MANET Containment Strategies." IEICE Transactions on Communications E91-B, no. 11 (2008): 3657–66. http://dx.doi.org/10.1093/ietcom/e91-b.11.3657.
Full textJain, Akanksha, and Abhishek Mathur. "Secure IDS against Sybil Attacker Routing Misbehavior in MANET." International Journal of Computer Applications 131, no. 11 (2015): 36–42. http://dx.doi.org/10.5120/ijca2015907488.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textAmouri, Amar, Salvatore Morgera, Mohamed Bencherif, and Raju Manthena. "A Cross-Layer, Anomaly-Based IDS for WSN and MANET." Sensors 18, no. 2 (2018): 651. http://dx.doi.org/10.3390/s18020651.
Full textR., Mangayarkarasi, and Manikandan R. "Deployment and Selection of Monitoring Nodes for Detection of Selfish Attacks in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 2217–21. https://doi.org/10.35940/ijeat.D6704.049420.
Full textT., Priyanka. "Detect and Correct Misbehavior Nodes in MANET Using ACK Algorithm." Journal of Advancement in Communication System 5, no. 2 (2022): 1–7. https://doi.org/10.5281/zenodo.7128381.
Full textLaqtib, Safaa, Khalid El Yassini, and Moulay Lahcen Hasnaoui. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701. http://dx.doi.org/10.11591/ijece.v10i3.pp2701-2709.
Full textSafaa, Laqtib, El Yassini Khalid, and Lahcen Hasnaoui Moulay. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701–9. https://doi.org/10.11591/ijece.v10i3.pp2701-2709.
Full textSunita Usturge. "Secure Routing and Hybrid SqueezenetFQuantumNN for Intrusion Detection in MANET." Panamerican Mathematical Journal 33, no. 3 (2024): 38–56. http://dx.doi.org/10.52783/pmj.v33.i3.880.
Full textThamizhmaran, K. "Different parameters of topology-based wireless acknowledgements in MANETS." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 1. http://dx.doi.org/10.26634/jwcn.10.2.18933.
Full textK, Palanisamy, and Manikannan M. "Energy Efficiency and Prevention of Packet Dropping Attacks Using IDS Scheme in MANETs." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 41–46. https://doi.org/10.5281/zenodo.1410961.
Full textVisumathi, J., and K. L. Shunmuganathan. "An Effective IDS for MANET Using Forward Feature Selection and Classification Algorithms." Procedia Engineering 38 (2012): 2816–23. http://dx.doi.org/10.1016/j.proeng.2012.06.330.
Full textAddula, Santosh Reddy, Udit Mamodiya, Weiwei Jiang, and Mohammed Amin Almaiah. "Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs." SHIFRA 2025 (February 1, 2025): 62–68. https://doi.org/10.70470/shifra/2025/003.
Full textHanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.
Full textShrivastava, Sonal, Chetan Agrawal, and Anurag Jain. "An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET." International Journal on AdHoc Networking Systems 5, no. 1 (2015): 1–13. http://dx.doi.org/10.5121/ijans.2015.5101.
Full textK., Thamizhmaran. "Dynamic Source Reactive Routing Protocol for MANET." Journal of Research in Electrical Power System 1, no. 1 (2025): 25–30. https://doi.org/10.5281/zenodo.15210161.
Full textSharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.
Full textSahu, Deeksha, Rajneesh Pachouri, and Anurag Jain. "Detection and Isolating Flood Rushing Attacks in WSN Using Timer Based Trolling Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 427–35. http://dx.doi.org/10.22214/ijraset.2022.46209.
Full textP, Wanda. "A Survey of Intrusion Detection System." International Journal of Informatics and Computation 1, no. 1 (2020): 1. http://dx.doi.org/10.35842/ijicom.v1i1.7.
Full textKhaliq, Abdul, and Sri Novida Sari. "PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS)." Jurnal Nasional Teknologi Komputer 2, no. 3 (2022): 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.
Full textYousra, Abdul Alsahib S. Aldeen, and Mohammed Abdulhadi Haider. "Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 5 (2020): 2401~2411. https://doi.org/10.12928/TELKOMNIKA.v18i5.14859.
Full textWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Full textArudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.
Full textAhlawat, Rashmi, and Setu K Chaturvedi. "A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET." International Journal of Computer Applications 80, no. 1 (2013): 34–38. http://dx.doi.org/10.5120/13827-1577.
Full text