1 |
Anantvalee T, Wu J, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," Wireless/Mobile Network Secure, Springer, pp.170-196, 2006.
|
2 |
D. M. Farid, and M. Z. Rahman, "Learning intrusion detection based on adaptive Bayesian algorithm," 11th International Conference on Computer and Information Technology (ICCIT2008), pp. 652-656, 2008.
|
3 |
R. Nakkeeran, T. Aruldoss Albert and R.Ezumalai, "Agent Based Efficient Anomaly Intrusion Detection System in Adhoc network" IACSIT International Journal of Engineering and Technology Vol. 2, No.1, February, 2010.
|
4 |
Snehal A. Mulay, P.R. Devale and G.V. Garje, "Intrusion Detection System Using Support Vector Machine and Decision Tree", International Journal of Computer Applications, Vol.3, No.3, June 2010.
|
5 |
Wang X, Lin T et a, "Feature Selection in Intrusion Detection System over Mobile Ad-hoc Network," Technical Report, Department of Computer Science, Iowa State University, 2005.
|
6 |
Zhang Y, Lee W, "Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Network, pp.545-556, 2003.
|
7 |
Y. K. Hassan, M. Hashim, A. El-Aziz, A. Safwat, A. El-Radi, "Performance Evaluation of Mobility Speed over MANET Routing Protocols," International Journal of Network Security, vol. 11, no. 3, pp.101-111, 2010.
|