Artykuły w czasopismach na temat „Types of MANET and IDS”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Types of MANET and IDS”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "DESIGNING SECURE MULTICASTING ROUTING ALGORITHMS IN MANET USING IDS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 407–10. https://doi.org/10.5281/zenodo.573517.
Pełny tekst źródłaMrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "INTRUSION DETECTION SYSTEM FOR MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 402–6. https://doi.org/10.5281/zenodo.581556.
Pełny tekst źródłaK.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.
Pełny tekst źródłaDixit, Shruti, Navneet Kaur, and Shalini Shahhay. "Intrusion Detection System Based on Particle Swarm Optimization in Mobile Ad-hoc Network: A Survey." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 89–93. https://doi.org/10.5281/zenodo.10718959.
Pełny tekst źródłaJavidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.
Pełny tekst źródłaEiny, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network." Wireless Communications and Mobile Computing 2021 (June 15, 2021): 1–12. http://dx.doi.org/10.1155/2021/6648351.
Pełny tekst źródłaK.Thamizhmaran. "Non-Base-Station based Wireless Communication in MANET using Hybrid Routing." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2025): 8–14. https://doi.org/10.5281/zenodo.14718160.
Pełny tekst źródłaK., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.
Pełny tekst źródłaPOOJA, L.CHELANI, C.KHAKE USHA, and S.LOKHANDE VANDANA. "TECHNIQUES FOR PREVENTING AND DETECTING MISBEHAVING NODES IN MANET: A SURVEY." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 4 (2017): 204–9. https://doi.org/10.5281/zenodo.1460111.
Pełny tekst źródłaMarepalli, Radha, and Rao C.V.Guru. "PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HOLE ATTACK:ISSUES AND CHALLENGES." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 7, no. 2 (2020): 1–8. https://doi.org/10.5281/zenodo.3980700.
Pełny tekst źródłaYassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.
Pełny tekst źródłaKhan, Zeeshan Ali, and Peter Herrmann. "Recent Advancements in Intrusion Detection Systems for the Internet of Things." Security and Communication Networks 2019 (July 3, 2019): 1–19. http://dx.doi.org/10.1155/2019/4301409.
Pełny tekst źródłaG., S. Sivagamasundari, and Thamizhmaran K. "Security Attack for Mobile Ad hoc Network using Hybrid Protocol called ZHLP." Journal of Emerging Trends in Electrical Engineering 4, no. 3 (2022): 1–6. https://doi.org/10.5281/zenodo.7349735.
Pełny tekst źródłaTalukdar, Md Ibrahim, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, and Amjed Sid Ahmed. "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature." Wireless Communications and Mobile Computing 2021 (March 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/6693316.
Pełny tekst źródłaVarule, Kavita, and Sachin Bojewar. "RWD based IDS for MANET." International Journal of Computer Applications 124, no. 13 (2015): 9–13. http://dx.doi.org/10.5120/ijca2015905722.
Pełny tekst źródłaRanjani, R., and JJayala kshmi. "Comparative Study of Ids for Manet." IOSR Journal of Computer Engineering 16, no. 2 (2014): 14–18. http://dx.doi.org/10.9790/0661-162121418.
Pełny tekst źródłaRavi, N., and G. Ramachandran. "A robust intrusion detection system using machine learning techniques for MANET." International Journal of Knowledge-based and Intelligent Engineering Systems 24, no. 3 (2020): 253–60. http://dx.doi.org/10.3233/kes-200047.
Pełny tekst źródłaRathish, CR, K. Karpagavadivu, P. Sindhuja, and A. Kousalya. "A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET." Information Technology and Control 50, no. 1 (2021): 45–54. http://dx.doi.org/10.5755/j01.itc.50.1.25002.
Pełny tekst źródłaVikas and Dr Shashiraj Teotia. "Optimization of Graph Neural Networks for Real-Time Intrusion Detection in Dynamic Mobile Ad-Hoc Networks." International Journal of Environmental Sciences 11, no. 11s (2025): 740–48. https://doi.org/10.64252/79452g17.
Pełny tekst źródłaKim, Young-Dong. "IDS Performance on MANET with Packet Aggregation Transmissions." Journal of the Korea institute of electronic communication sciences 9, no. 6 (2014): 695–701. http://dx.doi.org/10.13067/jkiecs.2014.9.6.695.
Pełny tekst źródłaAnilkumar, Prajeena, and Dr S. Malathy. "An Energy Efficient Acknowledgement Based Ids For Manet." IOSR Journal of Electronics and Communication Engineering 9, no. 3 (2014): 100–106. http://dx.doi.org/10.9790/2834-0933100106.
Pełny tekst źródłaGarg, Monika, Karanvir Kaur, and Simerpreet Kaur. "Using 3GPP- A Secure IDS for MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.
Pełny tekst źródłaRath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.
Pełny tekst źródłaSuganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.
Pełny tekst źródłaAli Zardari, Zulfiqar, Jingsha He, Nafei Zhu, et al. "A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs." Future Internet 11, no. 3 (2019): 61. http://dx.doi.org/10.3390/fi11030061.
Pełny tekst źródłaGandage, S. C., and A. Kumar. "DESIGN AND DEVELOPMENT OF IDS IN MANET USING PSO." Advances in Mathematics: Scientific Journal 9, no. 7 (2020): 5001–9. http://dx.doi.org/10.37418/amsj.9.7.65.
Pełny tekst źródłaKim, Young-Dong. "Performance Evaluation of IDS on MANET under Grayhole Attack." Journal of the Korea institute of electronic communication sciences 11, no. 11 (2016): 1077–82. http://dx.doi.org/10.13067/jkiecs.2016.11.11.1077.
Pełny tekst źródłaCHENG, B. C., H. CHEN, and R. Y. TSENG. "A Good IDS Response Protocol of MANET Containment Strategies." IEICE Transactions on Communications E91-B, no. 11 (2008): 3657–66. http://dx.doi.org/10.1093/ietcom/e91-b.11.3657.
Pełny tekst źródłaJain, Akanksha, and Abhishek Mathur. "Secure IDS against Sybil Attacker Routing Misbehavior in MANET." International Journal of Computer Applications 131, no. 11 (2015): 36–42. http://dx.doi.org/10.5120/ijca2015907488.
Pełny tekst źródłaSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Pełny tekst źródłaAmouri, Amar, Salvatore Morgera, Mohamed Bencherif, and Raju Manthena. "A Cross-Layer, Anomaly-Based IDS for WSN and MANET." Sensors 18, no. 2 (2018): 651. http://dx.doi.org/10.3390/s18020651.
Pełny tekst źródłaR., Mangayarkarasi, and Manikandan R. "Deployment and Selection of Monitoring Nodes for Detection of Selfish Attacks in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 2217–21. https://doi.org/10.35940/ijeat.D6704.049420.
Pełny tekst źródłaT., Priyanka. "Detect and Correct Misbehavior Nodes in MANET Using ACK Algorithm." Journal of Advancement in Communication System 5, no. 2 (2022): 1–7. https://doi.org/10.5281/zenodo.7128381.
Pełny tekst źródłaLaqtib, Safaa, Khalid El Yassini, and Moulay Lahcen Hasnaoui. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701. http://dx.doi.org/10.11591/ijece.v10i3.pp2701-2709.
Pełny tekst źródłaSafaa, Laqtib, El Yassini Khalid, and Lahcen Hasnaoui Moulay. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701–9. https://doi.org/10.11591/ijece.v10i3.pp2701-2709.
Pełny tekst źródłaSunita Usturge. "Secure Routing and Hybrid SqueezenetFQuantumNN for Intrusion Detection in MANET." Panamerican Mathematical Journal 33, no. 3 (2024): 38–56. http://dx.doi.org/10.52783/pmj.v33.i3.880.
Pełny tekst źródłaThamizhmaran, K. "Different parameters of topology-based wireless acknowledgements in MANETS." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 1. http://dx.doi.org/10.26634/jwcn.10.2.18933.
Pełny tekst źródłaK, Palanisamy, and Manikannan M. "Energy Efficiency and Prevention of Packet Dropping Attacks Using IDS Scheme in MANETs." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 41–46. https://doi.org/10.5281/zenodo.1410961.
Pełny tekst źródłaVisumathi, J., and K. L. Shunmuganathan. "An Effective IDS for MANET Using Forward Feature Selection and Classification Algorithms." Procedia Engineering 38 (2012): 2816–23. http://dx.doi.org/10.1016/j.proeng.2012.06.330.
Pełny tekst źródłaAddula, Santosh Reddy, Udit Mamodiya, Weiwei Jiang, and Mohammed Amin Almaiah. "Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs." SHIFRA 2025 (February 1, 2025): 62–68. https://doi.org/10.70470/shifra/2025/003.
Pełny tekst źródłaHanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.
Pełny tekst źródłaShrivastava, Sonal, Chetan Agrawal, and Anurag Jain. "An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET." International Journal on AdHoc Networking Systems 5, no. 1 (2015): 1–13. http://dx.doi.org/10.5121/ijans.2015.5101.
Pełny tekst źródłaK., Thamizhmaran. "Dynamic Source Reactive Routing Protocol for MANET." Journal of Research in Electrical Power System 1, no. 1 (2025): 25–30. https://doi.org/10.5281/zenodo.15210161.
Pełny tekst źródłaSharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.
Pełny tekst źródłaSahu, Deeksha, Rajneesh Pachouri, and Anurag Jain. "Detection and Isolating Flood Rushing Attacks in WSN Using Timer Based Trolling Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 427–35. http://dx.doi.org/10.22214/ijraset.2022.46209.
Pełny tekst źródłaP, Wanda. "A Survey of Intrusion Detection System." International Journal of Informatics and Computation 1, no. 1 (2020): 1. http://dx.doi.org/10.35842/ijicom.v1i1.7.
Pełny tekst źródłaKhaliq, Abdul, and Sri Novida Sari. "PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS)." Jurnal Nasional Teknologi Komputer 2, no. 3 (2022): 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.
Pełny tekst źródłaYousra, Abdul Alsahib S. Aldeen, and Mohammed Abdulhadi Haider. "Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 5 (2020): 2401~2411. https://doi.org/10.12928/TELKOMNIKA.v18i5.14859.
Pełny tekst źródłaArudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.
Pełny tekst źródłaWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Pełny tekst źródła