A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV

F Sakiz, S Sen - Ad Hoc Networks, 2017 - Elsevier
Vehicular ad hoc networks (VANETs) have become one of the most promising and fastest
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …

Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

S Pamarthi, R Narmadha - International Journal of Intelligent …, 2022 - emerald.com
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

SVM-DT-based adaptive and collaborative intrusion detection

S Teng, N Wu, H Zhu, L Teng… - IEEE/CAA Journal of …, 2017 - ieeexplore.ieee.org
As a primary defense technique, intrusion detection becomes more and more significant
since the security of the networks is one of the most critical issues in the world. We present …

Role of swarm and evolutionary algorithms for intrusion detection system: A survey

A Thakkar, R Lohiya - Swarm and evolutionary computation, 2020 - Elsevier
The growth of data and categories of attacks, demand the use of Intrusion Detection System
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …

Neuro-fuzzy based intrusion detection system for wireless sensor network

S Sinha, A Paul - Wireless personal communications, 2020 - Springer
Malicious attacks like denial-of-service massively affect the network activities of wireless
sensor network. These attacks exploit network layer vulnerabilities and affect all the layers of …

A survey of intrusion detection systems using evolutionary computation

S Sen - Bio-inspired computation in telecommunications, 2015 - Elsevier
Intrusion detection is an indispensable part of a security system. Because new attacks are
emerging every day, intrusion detection systems (IDSs) play a key role in identifying …

[PDF][PDF] Data mining in intrusion detection: a comparative study of methods, types and data sets

C Azad, VK Jha - Journal of IJITCS, 2013 - researchgate.net
In the era of information and communication technology, Security is an important issue. A lot
of effort and finance are being invested in this sector. Intrusion detection is one of the most …

Image encryption by novel cryptosystem using matrix transformation

B Acharya, SK Patra, G Panda - 2008 First International …, 2008 - ieeexplore.ieee.org
The Hill cipher is a famous symmetric cryptosystem that have several advantages in data
encryption. However, the Hill cipher algorithm cannot encrypt images that contain large …

Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks

MP Arthur, K Kannan - Wireless Networks, 2016 - Springer
Multicast communication of mobile ad hoc networks (MANET), rather than multiple unicast
communication, delivers common content to more than one receiver at a time. Due to cutting …