2015
DOI: 10.1016/j.procs.2015.04.071
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Based Intrusion Detection Systems in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 61 publications
(18 citation statements)
references
References 9 publications
0
17
0
Order By: Relevance
“…The idea is to offer an enhanced on-demand routing protocol more secure adaptively. Similar line of research work is also carried out by Balan et al [49]. The work carried out by Inaba et al [50] emphasizes on the improving the handover policy as well as call admission control by incorporating security approach.…”
Section: I) Fuzzy-logic Based Security Solutionmentioning
confidence: 70%
“…The idea is to offer an enhanced on-demand routing protocol more secure adaptively. Similar line of research work is also carried out by Balan et al [49]. The work carried out by Inaba et al [50] emphasizes on the improving the handover policy as well as call admission control by incorporating security approach.…”
Section: I) Fuzzy-logic Based Security Solutionmentioning
confidence: 70%
“…Every component of the model of rule induction is introduced in detail in Reference. 13 In the literature, 14 rule induction is carried out for the absence of feature values in the information system. In the literature, 15,16 the researchers used the result of attribute reduction to classify datasets with neural networks; the testing result indicated that with less study time the misclassification does not increase significantly, and they declared that the attribute reduction of rough set has the possibility of practical application.…”
Section: Related Workmentioning
confidence: 99%
“…However, there comparatively expensive operations have led to a rise in clustering techniques to mitigate the calculations need when associating anomaly detection with big data [12], [13]. Using aggregated data, such as NetFlow can be used to reduce the calculations further [14].…”
Section: Related Workmentioning
confidence: 99%