2008 IEEE International Symposium on Parallel and Distributed Processing With Applications 2008
DOI: 10.1109/ispa.2008.66
|View full text |Cite
|
Sign up to set email alerts
|

MANET Mining: Mining Temporal Association Rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Thus, the Ad hoc networks will be free from any malicious activity and normal flow of packets will be possible. [8] The objective is to implement a smart intrusion detection system using a Data Mining technique in MANET. Smart means the intrusion system should be able to identify the nodes which can impose threat to the network formed and should take steps in advance so that the attack before its impact should be controlled or managed by the IDS.…”
Section: Discussionmentioning
confidence: 99%
“…Thus, the Ad hoc networks will be free from any malicious activity and normal flow of packets will be possible. [8] The objective is to implement a smart intrusion detection system using a Data Mining technique in MANET. Smart means the intrusion system should be able to identify the nodes which can impose threat to the network formed and should take steps in advance so that the attack before its impact should be controlled or managed by the IDS.…”
Section: Discussionmentioning
confidence: 99%
“…Hu [13] applied the mining technique for composite web service discovery but his work was not applied to Mobile Ad hoc Network. Jabas [14] applies the mining technique to MANET traffic to find interesting relations ships among MANET nodes. Their research was motivated by the fact that these relationships can assist routing, MAC and other protocols of MANET.…”
Section: Related Workmentioning
confidence: 99%
“…Hu [16] applied the mining technique for composite web service discovery but this work was not applied to Mobile Ad hoc Network. Jabas [17] applies the mining technique to MANET traffic to find interesting relations ships among MANET nodes. Their research was motivated by the fact that these relationships can assist routing, MAC and other protocols of MANET.…”
Section: Literature Reviewmentioning
confidence: 99%