A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
F Sakiz, S Sen - Ad Hoc Networks, 2017 - Elsevier
Vehicular ad hoc networks (VANETs) have become one of the most promising and fastest
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …
Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …
and theoretical areas and their performance under various environments. WSNs have …
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …
among researchers in the development of theoretical and practical concepts, and their …
SVM-DT-based adaptive and collaborative intrusion detection
As a primary defense technique, intrusion detection becomes more and more significant
since the security of the networks is one of the most critical issues in the world. We present …
since the security of the networks is one of the most critical issues in the world. We present …
Role of swarm and evolutionary algorithms for intrusion detection system: A survey
The growth of data and categories of attacks, demand the use of Intrusion Detection System
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
Neuro-fuzzy based intrusion detection system for wireless sensor network
Malicious attacks like denial-of-service massively affect the network activities of wireless
sensor network. These attacks exploit network layer vulnerabilities and affect all the layers of …
sensor network. These attacks exploit network layer vulnerabilities and affect all the layers of …
A survey of intrusion detection systems using evolutionary computation
S Sen - Bio-inspired computation in telecommunications, 2015 - Elsevier
Intrusion detection is an indispensable part of a security system. Because new attacks are
emerging every day, intrusion detection systems (IDSs) play a key role in identifying …
emerging every day, intrusion detection systems (IDSs) play a key role in identifying …
[PDF][PDF] Data mining in intrusion detection: a comparative study of methods, types and data sets
In the era of information and communication technology, Security is an important issue. A lot
of effort and finance are being invested in this sector. Intrusion detection is one of the most …
of effort and finance are being invested in this sector. Intrusion detection is one of the most …
Image encryption by novel cryptosystem using matrix transformation
The Hill cipher is a famous symmetric cryptosystem that have several advantages in data
encryption. However, the Hill cipher algorithm cannot encrypt images that contain large …
encryption. However, the Hill cipher algorithm cannot encrypt images that contain large …
Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks
MP Arthur, K Kannan - Wireless Networks, 2016 - Springer
Multicast communication of mobile ad hoc networks (MANET), rather than multiple unicast
communication, delivers common content to more than one receiver at a time. Due to cutting …
communication, delivers common content to more than one receiver at a time. Due to cutting …