1 |
Nishani, L., Biba, M., "Machine learning for intrusion detection in MANET," a state-of-the-art survey. J Intell Inf Syst 46, pp. 391-407, 2016.
DOI
|
2 |
Shurman M.AI, Yoo S.M., Park S., " Black Hole Attack in Wireless Ad Hoc Networks.," In: Proceedings of ACM 42nd Southeast Conference (ACMSE 04), pp. 96-97, Alabama (2004).
|
3 |
Kim G, Han Y, Kim S., "A cooperative-sinkhole detection method for mobile ad hoc networks," AEU-International Journal of Electronics and Communications, ;64(5), pp. 390-397, 2010.
DOI
|
4 |
Cho JH, Chen IR. Performance analysis of hierarchi-cal group key management integrated with adaptiveintrusion detection in mobile ad hoc networks. Performance Evaluation, 68(1), pp. 58-75, 2011.
DOI
|
5 |
Mechtri L, Tolba FD, Ghanemi S., "MASID: multi-agent system for intrusion detection in MANET.," In Proceedings of Ninth IEEE International Conferenceon Information Technology : New Generations(ITNG), Las Vegas, Nevada, USA, April 2012, pp. 65-70.
|
6 |
Al-Roubaiey, A. Sheltami, T., Mahmoud, A., Shakshuki, E., Mouftah, H., "AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement," Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, Vol. 3, No. 1, pp. 634-640, 2010.
|
7 |
Mohanapriya M, Krishnamurthi I., "Modified DSR protocol for detection and removal of selective black hole attack in MANET.," Computers & Electrical Engineering, 40(2), pp. 530-538, 2013.
DOI
|
8 |
Kumar G, Kumar K., "An information theoretic ap-proach for feature selection.," Security and Communication Networks, 5(2), pp. 178-185, 2013.
DOI
|
9 |
Lin HC, Sun MK, Huang HW, Tseng CY, Lin HT., "A specification-based intrusion detection modelfor wireless ad hoc networks.," In Proceedings of Third IEEE International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA), Kaohsiung, Taiwan, September, pp. 252-257, 2012.
|