In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Wireless devices that communicate using the IEEE 802.11 protocol can be used to create mobile ad-hoc networks (MANETs). Many interesting applications using MANETs are realizable i...
In an ad-hoc mobile network architecture, all the mobile hosts (MHs) are connected with each other through a wireless network that has a frequently changing topology. This type of ...
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...