2009 IEEE International Conference on Control and Automation 2009
DOI: 10.1109/icca.2009.5410147
|View full text |Cite
|
Sign up to set email alerts
|

Immune inspired framework for ad hoc network security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Mohamed and Abdullah (2009) presented an AIS-based security framework for securing mobile ad hoc networks, which is scalable, robust, and has traits of distributability, second response and self-recovery. Their architecture resolved some limitations found in the previous related studies such as scalability and bandwidth conservation [55].…”
Section: Artificial Immune System Applicationsmentioning
confidence: 72%
“…Mohamed and Abdullah (2009) presented an AIS-based security framework for securing mobile ad hoc networks, which is scalable, robust, and has traits of distributability, second response and self-recovery. Their architecture resolved some limitations found in the previous related studies such as scalability and bandwidth conservation [55].…”
Section: Artificial Immune System Applicationsmentioning
confidence: 72%
“…IoT-Based Network Intrusion Detection Systems ((References: [54,58,62,63,64,65,66,67,68,69,99,100,101]) Disparate Membership Inference Attacks (Reference: [35]) Analysis of Open Source Datasets for IDS (Reference: [23,27]) Hybrid Deep Learning Model for IDS (Reference: [32]) Smart Home Anomaly-Based IDS ( Reference: [36]) The research articles meticulously examined in this study have been judiciously classified according to their quartile rankings, providing invaluable insights into the academic influence and eminence of these esteemed publications. The quartile categorization, elegantly portrayed in Fig.…”
Section: ) Cluster 4: Other Topicsmentioning
confidence: 99%
“…The immune inspired comprehensive security frameworks are presented by Mohamed and Abdullah in with a combined approach of negative selection, clonal selection, and danger theory. These frameworks are divided into three main sections: detection part, blocking/isolation part, and recovery section.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…These schemes suffer from high‐computational complexity due to processing the high volume and dimensional data in distributed environment. The AIS‐based IDSs focus on recognition of self and nonself patterns . However, these schemes should remove the antigens after recognition as in human immune system.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%