Gotowa bibliografia na temat „Types of MANET and IDS”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Types of MANET and IDS”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Types of MANET and IDS"
Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "DESIGNING SECURE MULTICASTING ROUTING ALGORITHMS IN MANET USING IDS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 407–10. https://doi.org/10.5281/zenodo.573517.
Pełny tekst źródłaMrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "INTRUSION DETECTION SYSTEM FOR MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 402–6. https://doi.org/10.5281/zenodo.581556.
Pełny tekst źródłaK.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.
Pełny tekst źródłaDixit, Shruti, Navneet Kaur, and Shalini Shahhay. "Intrusion Detection System Based on Particle Swarm Optimization in Mobile Ad-hoc Network: A Survey." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 89–93. https://doi.org/10.5281/zenodo.10718959.
Pełny tekst źródłaJavidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.
Pełny tekst źródłaEiny, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network." Wireless Communications and Mobile Computing 2021 (June 15, 2021): 1–12. http://dx.doi.org/10.1155/2021/6648351.
Pełny tekst źródłaK.Thamizhmaran. "Non-Base-Station based Wireless Communication in MANET using Hybrid Routing." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2025): 8–14. https://doi.org/10.5281/zenodo.14718160.
Pełny tekst źródłaK., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.
Pełny tekst źródłaPOOJA, L.CHELANI, C.KHAKE USHA, and S.LOKHANDE VANDANA. "TECHNIQUES FOR PREVENTING AND DETECTING MISBEHAVING NODES IN MANET: A SURVEY." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 4 (2017): 204–9. https://doi.org/10.5281/zenodo.1460111.
Pełny tekst źródłaMarepalli, Radha, and Rao C.V.Guru. "PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HOLE ATTACK:ISSUES AND CHALLENGES." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 7, no. 2 (2020): 1–8. https://doi.org/10.5281/zenodo.3980700.
Pełny tekst źródłaRozprawy doktorskie na temat "Types of MANET and IDS"
Langin, Chester Louis. "A SOM+ Diagnostic System for Network Intrusion Detection." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/389.
Pełny tekst źródłaChung, Shang-Wei, and 鍾尚衛. "Applying Dynamic Trust on The Union-Defense-Based IDS of MANET." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/39061451855311049185.
Pełny tekst źródłaCzęści książek na temat "Types of MANET and IDS"
Hassan, Khondekar Lutful, Somnath Bera, and Pranab Bag. "Agent Based IDS Using RMBOPB Technique in MANET." In Communications in Computer and Information Science. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6427-2_28.
Pełny tekst źródłaPuttini, Ricardo S., Jean-Marc Percher, Ludovic Mé, et al. "A Modular Architecture for Distributed IDS in MANET." In Computational Science and Its Applications — ICCSA 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44842-x_11.
Pełny tekst źródłaPathak, Priya, Ekta Chauhan, Sugandha Rathi, and Siddhartha Kosti. "HMM-Based IDS for Attack Detection and Prevention in MANET." In Information and Communication Technology for Sustainable Development. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3920-1_42.
Pełny tekst źródłaChawla, Kitti, Jasmeen Gill, and Mohanjeet Singh. "Comprehensive Survey of IDS Techniques in Mobile Ad Hoc Network (MANET)." In Soft Computing for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1048-6_35.
Pełny tekst źródłaSingh, C. Edwin, and J. Amar Pratap Singh. "An Investigation of Machine Learning-Based IDS for Green Smart Transportation in MANET." In Artificial Intelligence for Smart Healthcare. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23602-0_5.
Pełny tekst źródłaKuchaki Rafsanjani, Marjan, and Arsham Borumand Saeid. "Determination of IDS Agent Nodes Based on Three-Tiered Key Management Framework for MANET." In Networked Digital Technologies. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14306-9_64.
Pełny tekst źródłaHota, H. S., and Akhilesh Kumar Shrivas. "Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS)." In Intelligent Computing, Networking, and Informatics. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_85.
Pełny tekst źródłaMeddeb Rahma, Triki Bayrem, Jmili Farah, and Korbaa Ouajdi. "An Effective IDS Against Routing Attacks on Mobile Ad-Hoc Networks." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2018. https://doi.org/10.3233/978-1-61499-900-3-201.
Pełny tekst źródłaPradhan, Manoranjan, Chinmaya Kumar Nayak, and Sateesh Kumar Pradhan. "Intrusion Detection System (IDS) and Their Types." In Securing the Internet of Things. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch026.
Pełny tekst źródłaPradhan, Manoranjan, Chinmaya Kumar Nayak, and Sateesh Kumar Pradhan. "Intrusion Detection System (IDS) and Their Types." In Network Security Attacks and Countermeasures. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch009.
Pełny tekst źródłaStreszczenia konferencji na temat "Types of MANET and IDS"
Maurer, Jack R. "Results of Seven Years Exposure of Dissimilar Metal Crevice Assemblies in Filtered Seawater." In CORROSION 1993. NACE International, 1993. https://doi.org/10.5006/c1993-93490.
Pełny tekst źródłaKarygiannis, A., K. Robotis, and E. Antonakakis. "Creating Offline MANET IDS Network Traces." In 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE, 2007. http://dx.doi.org/10.1109/wowmom.2007.4351704.
Pełny tekst źródłaSujatha, K. S., Vydeki Dharmar, and R. S. Bhuvaneswaran. "Design of genetic algorithm based IDS for MANET." In 2012 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2012. http://dx.doi.org/10.1109/icrtit.2012.6206796.
Pełny tekst źródłaBahareh Pahlevanzadeh and Azman Samsudin. "Distributed hierarchical IDS for MANET over AODV+." In 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications. IEEE, 2007. http://dx.doi.org/10.1109/ictmicc.2007.4448633.
Pełny tekst źródłaPetersen, Erick, Marco Antonio To, and Stephane Maag. "A novel online CEP learning engine for MANET IDS." In 2017 IEEE 9th Latin-American Conference on Communications (LATINCOM). IEEE, 2017. http://dx.doi.org/10.1109/latincom.2017.8240196.
Pełny tekst źródłaMechtri, Leila, Fatiha Djemili Tolba, Salim Ghanemi, and Damien Magoni. "An IDS-based Self-healing Approach for MANET Survival." In IPAC '15: International Conference on Intelligent Information Processing, Security and Advanced Communication. ACM, 2015. http://dx.doi.org/10.1145/2816839.2816840.
Pełny tekst źródłaOtrok, Hadi, Noman Mohammed, Lingyu Wang, Mourad Debbabi, and Prabir Bhattacharya. "An Efficient and Truthful Leader IDS Election Mechanism for MANET." In Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007). IEEE, 2007. http://dx.doi.org/10.1109/wimob.2007.4390872.
Pełny tekst źródłaRai, Sandeep, Rajesh Boghey, and Priyanka Rani Yadav. "Cluster based energy efficient authentication scheme for secure IDS over MANET." In 2017 7th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2017. http://dx.doi.org/10.1109/csnt.2017.8418537.
Pełny tekst źródłaSabat, Santoshkumar, and Sujata Kadam. "Adaptive Energy aware reputation based leader election for IDS in MANET." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6949972.
Pełny tekst źródłaShona, D., and M. Senthil Kumar. "Efficient IDs for MANET Using Hybrid Firefly with a Genetic Algorithm." In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2018. http://dx.doi.org/10.1109/icirca.2018.8597268.
Pełny tekst źródłaRaporty organizacyjne na temat "Types of MANET and IDS"
Aslam, Saba, and Megan Schmidt-Sane. Evidence Review: COVID-19 Recovery in South Asian Urban Informal Settlements. SSHAP, 2022. http://dx.doi.org/10.19088/sshap.2022.012.
Pełny tekst źródła