• No results found

Malicious Node Detection

INTRUSION DETECTION SYSTEM AGAINST MALICIOUS PACKET DROPPING IN MOBILE AD-HOC NETWORK USING MALICIOUS NODE DETECTION ALGORITHM

INTRUSION DETECTION SYSTEM AGAINST MALICIOUS PACKET DROPPING IN MOBILE AD-HOC NETWORK USING MALICIOUS NODE DETECTION ALGORITHM

... multiple malicious nodes collude together to initiate a collaborative attack, which may result to more devastating damages to the ...of malicious node detection in ...the detection of a ...

11

Neighbor Based Malicious Node Detection in Wireless Sensor Networks

Neighbor Based Malicious Node Detection in Wireless Sensor Networks

... neighbor-based malicious node detection scheme for wireless sensor ...networks. Malicious nodes are modeled as faulty nodes behaving intelli- gently to lead to an incorrect decision or energy ...

7

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... 2.1.1 Data Mining Technique for Significant Rule Generation: Proposed Association Rule mining algorithm A transaction database contains daily transacted items.. In a transactional databa[r] ...

11

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... Nowadays, WDM is widely used for expanding capacity in optical networks. In a WDM network, each fibre link can carry high-rate traffic at many different wavelengths and hence multiple channels can be created within a ...

10

A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis

A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis

... A parallel Signature based way of doing things proposed by the some researchers, in this approach, they are analyzing the network traffic with processing. In this method, complete rule groups are spread across nodes. ...

7

An Experimental Analysis on Various Techniques for Malicious node Detection in MANET

An Experimental Analysis on Various Techniques for Malicious node Detection in MANET

... to detection malicious nodes. Therefore regardless of malicious nodes existence, the overhead of detection is constantly created, and the resource used for detection is constantly ...

10

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... This paper highlights the importance and applications of spatio-temporal pattern mining and provides a brief survey of key mining techniques for discovering three types of spatio-tempora[r] ...

10

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... each node in the OAG, all of these features are constructed in a feature vector, based on which the feature model was defined on the OAG, and the neighbor system, potential cliques and energy functions of OAG are ...

12

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... [9] Imarazene Khoukha , Chekireb Hachemi, Berkouk El Madjid, “ANN control of Nine Level NPC Voltage Inverter Based on Selective Harmonics Elimination” [10] Mehrdad Tarafdar Hagh, Hassan [r] ...

7

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... The clustering-based approaches used either the Kmeans [8] or agglomerative hierarchical clustering techniques were proposed to reduce the search pace in order to improve the efficiency [r] ...

8

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... The above mentioned problem is overcome by the designed hybrid controller combination of proportional double integral controller PDIC plus fuzzy logic controller FLC based LFC for multi [r] ...

6

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... The grid side converter plays a dual role of interfacing the wind energy to grid as well as to supply reactive power as demanded by the non-linear load connected at the PCC.. A simple mo[r] ...

8

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... A gain tuning PI controller structure using the voltage applied on motor phase windings and motor rotor speed which is used for the speed control of SRM [6].. fuzzy logic have been used [r] ...

8

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... accuracy, detection rate, and false alarm against the training and testing ...lower detection rate and higher false ...and detection rate by ...based detection is assessed by the false alarm ...

6

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... The inherent relationship between keyframes and objects were further addressed in [6], [7], [8] where a unified feature space is developed to represent frames and objects simultaneously,[r] ...

8

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... Intrusion detection has been efficiently used to discriminate attacks in wired networks that can afford a second line of ...the detection techniques as Signature based detection system, Anomaly based ...

10

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... Though SVM-RFE is proved to be one of the most successful feature selection methods, it selects features using the gene expression data only without using any other biological informatio[r] ...

8

Title: An Acknowledgement Based Malicious Node Detection For MANETS

Title: An Acknowledgement Based Malicious Node Detection For MANETS

... Abstract: Mobiles are widely and commonly used thing in the world. Because of it’s mobility and scalability. Mobility is achieved through the Manet which was wireless network. So it has no fixed infrastructure and it ...

5

Malicious Node Detection in MANET

Malicious Node Detection in MANET

... every node is act as a transmitter and a ...Any node can act as a misbehaving ...the malicious nodes can easily attack the mobile ...Intrusion Detection System in which the malicious ...

5

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK

... cup detection can be done from ARGALI key parameters such as rim volume, cup/disc area ratio, cup area and volume, disc area and volume ...ratio detection is focused and a comparative result of the proposed ...

8

Show all 10000 documents...

Related subjects