Gotowa bibliografia na temat „Types of MANET and IDS”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Types of MANET and IDS”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Types of MANET and IDS"

1

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "DESIGNING SECURE MULTICASTING ROUTING ALGORITHMS IN MANET USING IDS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 407–10. https://doi.org/10.5281/zenodo.573517.

Pełny tekst źródła
Streszczenie:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly.This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and researche
Style APA, Harvard, Vancouver, ISO itp.
2

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "INTRUSION DETECTION SYSTEM FOR MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 402–6. https://doi.org/10.5281/zenodo.581556.

Pełny tekst źródła
Streszczenie:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and research
Style APA, Harvard, Vancouver, ISO itp.
3

K.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.

Pełny tekst źródła
Streszczenie:
<em>Mobile Ad-hoc Network (MANET) various mobile nodes moves from one location to another location dynamically with in transmission range. MANETs are popular for critical applications like military use or disaster recovery because of the nodes' capacity to self-configure.&nbsp; Most of the developed protocols assume that every nodes in the network are mutual, and do not address any security issue.&nbsp; To adjust to such development, it is essential to address its probable security issues. The nature of dynamic topology in mobile ad hoc networks raises serious security concerns. In order to ch
Style APA, Harvard, Vancouver, ISO itp.
4

Dixit, Shruti, Navneet Kaur, and Shalini Shahhay. "Intrusion Detection System Based on Particle Swarm Optimization in Mobile Ad-hoc Network: A Survey." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 89–93. https://doi.org/10.5281/zenodo.10718959.

Pełny tekst źródła
Streszczenie:
<em>Abstract- </em>Mobile Ad-hoc network (MANET) is the assortment of cooperative wireless nodes without existence of any access point or infrastructure. Due to problems like wireless radio, limited battery power, limited bandwidth and dynamic topology environment, nodes are susceptible for intrusion and attack. Security is an important field in this type of network. Each node in a MANET is capable of acting as a router. Routing and routing protocols are important aspects having various security concerns. The bio-inspired approach known as Particle Swarm Optimization (PSO) based on Swarm Intel
Style APA, Harvard, Vancouver, ISO itp.
5

Javidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.

Pełny tekst źródła
Streszczenie:
MANETs are self configuring networks that are formed by a set of wireless mobile nodes and have no fixed network infrastructure nor administrative support. Since transmission range of wireless network interfaces is limited, forwarding hosts may be needed. Each node in a wireless ad hoc network functions is as both a host and a router. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions so, security is a critical issue. Network security is usually provided in the three phases: intrusion prevention, intrusion detection and in
Style APA, Harvard, Vancouver, ISO itp.
6

Einy, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network." Wireless Communications and Mobile Computing 2021 (June 15, 2021): 1–12. http://dx.doi.org/10.1155/2021/6648351.

Pełny tekst źródła
Streszczenie:
Given the growth of wireless networks and the increase of the advantages and applications of communication networks, especially mobile ad hoc networks (MANETs), this type of network has attracted the attention of users and researchers more than before. The benefit of these types of networks in various kinds of networks and environments is that MANET does not require to hardware infrastructure to communicate and send and receive data packets within the network. It is one of the main reasons for using these MANET in various fields. On the other hand, the increased popularity of these networks ha
Style APA, Harvard, Vancouver, ISO itp.
7

K.Thamizhmaran. "Non-Base-Station based Wireless Communication in MANET using Hybrid Routing." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2025): 8–14. https://doi.org/10.5281/zenodo.14718160.

Pełny tekst źródła
Streszczenie:
<em>Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that current IDS solutions cannot address, the solutions might not always be enough. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediary nodes on a route to specific targets and drop any packet that passes through them. The mechanism is cooperative, therefore the protocol cooperates to analyze and discover malicious nodes in MANETs in a reliable way. In this study, th
Style APA, Harvard, Vancouver, ISO itp.
8

K., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.

Pełny tekst źródła
Streszczenie:
<em>Mobile Ad-hoc Networks (MANETs) are a subset of wireless ad-hoc networks that typically consist of an end-to-end Link Layer (LL) ad-hoc network with a routable networking environment. Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that these IDS solutions cannot address, the solutions might not always be adequate. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediate nodes of a route to specific targets and drop any
Style APA, Harvard, Vancouver, ISO itp.
9

POOJA, L.CHELANI, C.KHAKE USHA, and S.LOKHANDE VANDANA. "TECHNIQUES FOR PREVENTING AND DETECTING MISBEHAVING NODES IN MANET: A SURVEY." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 4 (2017): 204–9. https://doi.org/10.5281/zenodo.1460111.

Pełny tekst źródła
Streszczenie:
A Mobile Adhoc Network (MANET) is a collection of independent mobile nodes that can communicate to each other throughradio waves without the aid of any stand-alone infrastructure or centralized administration. These nodes are self-organizing and self-configuring and they act as both hostas well as routers.In MANET each node is free to move independently.MANET is simple and flexible hence widely used in military communication, emergency communication and mobile conferencing. Due to dynamic nature and no certification authority, MANETs are more prone to different types of attacks. The essential
Style APA, Harvard, Vancouver, ISO itp.
10

Marepalli, Radha, and Rao C.V.Guru. "PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HOLE ATTACK:ISSUES AND CHALLENGES." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 7, no. 2 (2020): 1–8. https://doi.org/10.5281/zenodo.3980700.

Pełny tekst źródła
Streszczenie:
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc. When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an insider. Among various mobility models to generate mobility patterns the Random w
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Types of MANET and IDS"

1

Langin, Chester Louis. "A SOM+ Diagnostic System for Network Intrusion Detection." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/389.

Pełny tekst źródła
Streszczenie:
This research created a new theoretical Soft Computing (SC) hybridized network intrusion detection diagnostic system including complex hybridization of a 3D full color Self-Organizing Map (SOM), Artificial Immune System Danger Theory (AISDT), and a Fuzzy Inference System (FIS). This SOM+ diagnostic archetype includes newly defined intrusion types to facilitate diagnostic analysis, a descriptive computational model, and an Invisible Mobile Network Bridge (IMNB) to collect data, while maintaining compatibility with traditional packet analysis. This system is modular, multitaskable, scalable, i
Style APA, Harvard, Vancouver, ISO itp.
2

Chung, Shang-Wei, and 鍾尚衛. "Applying Dynamic Trust on The Union-Defense-Based IDS of MANET." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/39061451855311049185.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Types of MANET and IDS"

1

Hassan, Khondekar Lutful, Somnath Bera, and Pranab Bag. "Agent Based IDS Using RMBOPB Technique in MANET." In Communications in Computer and Information Science. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6427-2_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Puttini, Ricardo S., Jean-Marc Percher, Ludovic Mé, et al. "A Modular Architecture for Distributed IDS in MANET." In Computational Science and Its Applications — ICCSA 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44842-x_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Pathak, Priya, Ekta Chauhan, Sugandha Rathi, and Siddhartha Kosti. "HMM-Based IDS for Attack Detection and Prevention in MANET." In Information and Communication Technology for Sustainable Development. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3920-1_42.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Chawla, Kitti, Jasmeen Gill, and Mohanjeet Singh. "Comprehensive Survey of IDS Techniques in Mobile Ad Hoc Network (MANET)." In Soft Computing for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1048-6_35.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Singh, C. Edwin, and J. Amar Pratap Singh. "An Investigation of Machine Learning-Based IDS for Green Smart Transportation in MANET." In Artificial Intelligence for Smart Healthcare. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23602-0_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kuchaki Rafsanjani, Marjan, and Arsham Borumand Saeid. "Determination of IDS Agent Nodes Based on Three-Tiered Key Management Framework for MANET." In Networked Digital Technologies. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14306-9_64.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Hota, H. S., and Akhilesh Kumar Shrivas. "Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS)." In Intelligent Computing, Networking, and Informatics. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_85.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Meddeb Rahma, Triki Bayrem, Jmili Farah, and Korbaa Ouajdi. "An Effective IDS Against Routing Attacks on Mobile Ad-Hoc Networks." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2018. https://doi.org/10.3233/978-1-61499-900-3-201.

Pełny tekst źródła
Streszczenie:
The connectivity of mobile networks is increasing heavily and the evolution of the risks is highly dynamic. In Mobile Ad Hoc Network (MANET), attacks and digital attacks are becoming increasingly complex. Due to their nature, these networks make some information unavailable and/or incomplete needed for attacks detection process. Several solutions have been made to ensure the security of mobile networks specially intrusion detection systems (IDS). This solution allows enhancing IDS detection efficiency even with incomplete information about occurred attacks. In this paper, we propose an IDS bas
Style APA, Harvard, Vancouver, ISO itp.
9

Pradhan, Manoranjan, Chinmaya Kumar Nayak, and Sateesh Kumar Pradhan. "Intrusion Detection System (IDS) and Their Types." In Securing the Internet of Things. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch026.

Pełny tekst źródła
Streszczenie:
Over the last two decades, computer and network security has become a main issue, especially with the increase number of intruders and hackers, therefore systems were designed to detect and prevent intruders. This chapter per the authors investigated the most important design approaches, by mainly focusing on their collecting, analysis, responding capabilities and types of current IDS products. For the collecting capability, there were two main approaches, namely host- and network-based IDSs. Therefore, a combination of the two approaches in a hybrid implementation is ideal, as it will offer t
Style APA, Harvard, Vancouver, ISO itp.
10

Pradhan, Manoranjan, Chinmaya Kumar Nayak, and Sateesh Kumar Pradhan. "Intrusion Detection System (IDS) and Their Types." In Network Security Attacks and Countermeasures. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch009.

Pełny tekst źródła
Streszczenie:
Over the last two decades, computer and network security has become a main issue, especially with the increase number of intruders and hackers, therefore systems were designed to detect and prevent intruders. This chapter per the authors investigated the most important design approaches, by mainly focusing on their collecting, analysis, responding capabilities and types of current IDS products. For the collecting capability, there were two main approaches, namely host- and network-based IDSs. Therefore, a combination of the two approaches in a hybrid implementation is ideal, as it will offer t
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Types of MANET and IDS"

1

Maurer, Jack R. "Results of Seven Years Exposure of Dissimilar Metal Crevice Assemblies in Filtered Seawater." In CORROSION 1993. NACE International, 1993. https://doi.org/10.5006/c1993-93490.

Pełny tekst źródła
Streszczenie:
Abstract The super stainless alloys began to make a major impact on material applications in the late seventies and early eighties. Both ferritic and austenitic alloys were developed, tested and applied to severe corrosive environments to bridge the gap between the standard alloys and the exotic high technology materials. Laboratory and natural marine exposures with and without non-metallic crevice formers demonstrated the highly resistant properties of these materials. Both types demonstrated superior resistance chloride pitting and crevice corrosion. In controlled laboratory tests, the super
Style APA, Harvard, Vancouver, ISO itp.
2

Karygiannis, A., K. Robotis, and E. Antonakakis. "Creating Offline MANET IDS Network Traces." In 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE, 2007. http://dx.doi.org/10.1109/wowmom.2007.4351704.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Sujatha, K. S., Vydeki Dharmar, and R. S. Bhuvaneswaran. "Design of genetic algorithm based IDS for MANET." In 2012 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2012. http://dx.doi.org/10.1109/icrtit.2012.6206796.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bahareh Pahlevanzadeh and Azman Samsudin. "Distributed hierarchical IDS for MANET over AODV+." In 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications. IEEE, 2007. http://dx.doi.org/10.1109/ictmicc.2007.4448633.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Petersen, Erick, Marco Antonio To, and Stephane Maag. "A novel online CEP learning engine for MANET IDS." In 2017 IEEE 9th Latin-American Conference on Communications (LATINCOM). IEEE, 2017. http://dx.doi.org/10.1109/latincom.2017.8240196.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Mechtri, Leila, Fatiha Djemili Tolba, Salim Ghanemi, and Damien Magoni. "An IDS-based Self-healing Approach for MANET Survival." In IPAC '15: International Conference on Intelligent Information Processing, Security and Advanced Communication. ACM, 2015. http://dx.doi.org/10.1145/2816839.2816840.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Otrok, Hadi, Noman Mohammed, Lingyu Wang, Mourad Debbabi, and Prabir Bhattacharya. "An Efficient and Truthful Leader IDS Election Mechanism for MANET." In Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007). IEEE, 2007. http://dx.doi.org/10.1109/wimob.2007.4390872.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Rai, Sandeep, Rajesh Boghey, and Priyanka Rani Yadav. "Cluster based energy efficient authentication scheme for secure IDS over MANET." In 2017 7th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2017. http://dx.doi.org/10.1109/csnt.2017.8418537.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sabat, Santoshkumar, and Sujata Kadam. "Adaptive Energy aware reputation based leader election for IDS in MANET." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6949972.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Shona, D., and M. Senthil Kumar. "Efficient IDs for MANET Using Hybrid Firefly with a Genetic Algorithm." In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2018. http://dx.doi.org/10.1109/icirca.2018.8597268.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Types of MANET and IDS"

1

Aslam, Saba, and Megan Schmidt-Sane. Evidence Review: COVID-19 Recovery in South Asian Urban Informal Settlements. SSHAP, 2022. http://dx.doi.org/10.19088/sshap.2022.012.

Pełny tekst źródła
Streszczenie:
The global pandemic has brought renewed attention toward the everyday challenges in informal settlements. COVID-19 reminds us that southern urban life is rooted in ‘collective’ experiences where toilets and kitchens are shared by multiple families; where the categories of work and home, private and public space overlap; and where the majority live in vulnerable conditions. Despite these challenges, some of the most innovative and collective responses to COVID-19 have emerged from these areas. While informal settlements did face a host of risks and vulnerabilities during the pandemic, local res
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!