Network-based approach for training supervised learning classifiers

JP Vasseur, A Di Pietro, G Mermoud… - US Patent …, 2019‏ - Google Patents
In one embodiment, a supervisory device in a network receives traffic data from a security
device that uses traffic signatures to assess traffic in the network. The supervisory device …

Energy efficient cluster based routing in manet

A Roy, M Hazarika… - … , Information & Computing …, 2012‏ - ieeexplore.ieee.org
Energy efficient cluster formation of nodes in Mobile Ad-Hoc Networks (MANETs) is very
important as nodes in MANETs typically operate unattended with a limited power source …

[PDF][PDF] Mobility based cluster head selection algorithm for mobile ad-hoc network

S Talapatra, A Roy - International Journal of Computer Network and …, 2014‏ - mecs-press.org
(MANETs) has become a crucial research issue in modern days, because clustering can
improve system performance of MANETs. As MANETs have limited battery power supply …

Gray hole attack detection in MANETs

SU Patil - 2017 2nd International Conference for Convergence …, 2017‏ - ieeexplore.ieee.org
Networking system does not liable on static infrastructure that interconnects various nodes in
identical broadcast range dynamically called as Mobile Ad-hoc Network. A Network requires …

Improved EAACK: develop secure intrusion detection system for MANETs using hybrid cryptography

S Awatade, S Joshi - 2016 International Conference on …, 2016‏ - ieeexplore.ieee.org
Data transfer rate is more in wireless network as compared to wired network. Wireless
network gives more advantageous because its support feature such as versatility, portability …

Cluster based energy efficient routing protocol for mobile ad hoc networks: A survey

N Swarupa, A Lathigara, S Soni - AIP Conference Proceedings, 2023‏ - pubs.aip.org
The Mobile Ad-Hoc Network (MANET) has the potential to build clusters, in which multiple
nodes can work together to manage themselves. However, due to MANET's limited power …

Dynamic cluster head selection to detect gray hole attack using intrusion detection system in MANETs

R Funde, P Chandre - Proceedings of the Sixth International Conference …, 2015‏ - dl.acm.org
A Networking system that does not liable on static infrastructure that interconnects various
nodes in identical broadcast range is called as Mobile Ad-hoc Network. A Network requires …

[PDF][PDF] Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks

B Bhatia, MK Soni, P Tomar - International Journal of Computer …, 2015‏ - mecs-press.org
In today's world mobile agents and mobile adhoc networks are the two technologies that are
contributing towards better connectivity and communicability. When the two technologies …

Energy Efficient Weight Based Clustering in MANET

MKD Barma, P Kar - Proceedings of the 1st International Conference on …, 2017‏ - dl.acm.org
Energy is a critical issue in cluster based routing protocol in MANET (Mobile Ad hoc
Network). When death of a cluster head occurs, re-clustering technique needs to be invoked …

[PDF][PDF] A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network

D Singh, SS Bedi - International Journal of Computer Applications, 2013‏ - researchgate.net
ABSTRACT Mobile Ad Hoc Networks are more vulnerable to attacks. Due to vulnerability,
security in MANETs has been an issue of prime importance in the recent years. The common …