1 |
Meddeb, R., Triki, B., Jmili, F., & Korbaa, O., "An effective IDS against routing attacks on mobile ad hoc networks", Frontiers in Artificial Intelligence and Applications, pp. 201-204, 2018.
|
2 |
S. Sreenivasa Chakravarthi and Suresh Veluru, "A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS", 2014 Sixth International Conference on Computational Intelligence and Communication Networks 2014 IEEE, pp. 730-737.
|
3 |
E Vishnu Balan, M K Priyan, C Gokulnath and G Vsha Devi, "Fuzzy Based Intrusion Detection Systems in MANET", science direct elsevier Procedia Computer Science, vol. 50, pp. 109-114, 2015.
DOI
|
4 |
S. S. Zalte and V. R. Ghorpade2, "Pre-Path and Post-Path Security to Mobile Adhoc Network", 2017 IJSRSET, vol. 3, pp. 575-578.
|
5 |
Borkar, A., Donode, A., & Kumari, A., "A survey on intrusion detection system (IDS) and internal intrusion detection and protection system (SA-IDPS)", In 2017 International conference on inventive computing and informatics (ICICI).
|
6 |
Naeem Razal, Muhammad Umar Aftabl, Muhammad Qasim Akbar2, Omair Ashraf3 and Muhammad Irfan4, "Mobile Ad-Hoc Networks Applications and Its Challenges" in Communications and Network, pp. 131-136, 2016.
DOI
|
7 |
Tarek M. Mahmoud, Abdelmgeid A. Aly and M. Omar Makram, "A Modified AODV Routing Protocol to Avoid Black Hole Attack in MANETs", International Journal of Computer Applications (0975-8887), vol. 109, no. 6, pp. 27-33, January 2015.
DOI
|