Reactive protocols for unified user profiling for anomaly detection in mobile Ad Hoc networks
Abstract
Keywords
Full Text:
PDFReferences
M. S. Parwez, D. B. Rawat and M. Garuba, "Big data analytics for user-activity analysis and user-anomaly detection in mobile wireless network," IEEE Transactions on Industrial Informatics, vol. 13, no. 4, pp. 2058-2065, 2017.
P. N. Reddy, C. Vishnuvardhan and V. Ramesh, "An Overview on Reactive Protocols for Mobile Ad-Hoc Networks," International Journal of Computer Science and Mobile Computing, vol. 2, no. 5, pp. 368-375, 2013.
M. Wang and S. Handurukande, "Anomaly Detection for Mobile Network Management," International Journal of Next-Generation Computing, vol. 9, no. 2, pp. 81-97, 2018.
L. Bodrog, M. Kaj´o, S. Kocsis and B. Schultz, "Robust Algorithm for Anomaly Detection in Mobile Networks," in 6th International Workshop on Self-Organizing Networks, Budapest, Hungary, 2016.
R. B¨uschkes, D. Kesdogan and P. Reichl, "How to Increase Security in Mobile Networks by Anomaly Detection," in Proceedings 14th Annual Computer Security Applications Conference, Aachen, Germany, 1998.
M. H. Kamarudin, C. Maple, T. Watson, and N. S. Safa, "A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks," Security and Communication Networks, no. 2539034, pp. 1-18, 2017.
R. Kaur and S. Singh, "A survey of data mining and social network analysis based anomaly detection techniques," Egyptian Informatics Journal, vol. 17, p. 199–216, 2016.
A. H. Lashkari, M. Chen and A. A. Ghorbani, "A Survey on User Profiling Model for Anomaly Detection in Cyberspace," Journal of Cyber Security and Mobility, vol. 8, no. 1, p. 75–112, 2018.
S. Kalwar, "Introduction to reactive protocol," IEEE Potentials, vol. 29, no. 2, pp. 34-35, 2010.
P. Grant and H. Ashman, "Anomaly detection over user profiles," in Proceedings of the 8th Australian Information Security Management Conference, Adelaide, Australia, 2010.
M. Grčar, D. Mladenič, and M. Grobelnik, "User Profiling for Interest-focused Browsing History," in Proceedings of the Workshop on End User Aspects of the Semantic Web, Ljubljana, Slovenia, 2005.
A. Ortigosa, R. M. Carro and J. I. Quiroga, "Predicting user personality by mining social interactions in Facebook," Journal of Computer and System Sciences, vol. 80, no. 1, pp. 57-71, 2014.
M. Corney, G. Mohay and A. Clark, "Detection of Anomalies from User Profiles Generated from System," in Proceedings of the Ninth Australasian Information Security Conference, Perth, Australia, 2011.
X. Luo, X. Di, X. Liu, H. Qi, J. Li, L. Cong, and H. Yang, "Anomaly Detection for Application Layer User Browsing Behavior Based on Attributes and Features," Journal of Physics: Conference Series, vol. 1069, no. 1, p. 012072, 2018.
Abdulshaheed, H.R., Binti, S.A., and Sadiq, I.I., 2018. Proposed a Smart Solutions Based-on Cloud Computing and Wireless Sensing. International Journal of Pure and Applied Mathematics, 119 (18), pp.427–449.
Barazanchi, I. Al, Shibghatullah, A.S., and Selamat, S.R., 2017. A New Routing Protocols for Reducing Path Loss in Wireless Body Area Network ( WBAN ). Journal of Telecommunication, Electronic and Computer Engineering model, 9 (1), pp.1–5.
Abdulshaheed, H.R., Binti, S.A., and Sadiq, I.I., 2018. A Review on Smart Solutions Based-On Cloud Computing and Wireless Sensing. International Journal of Pure and Applied Mathematics, 119 (18), pp.461–486.
B. Durakovic, “Thermal Performances of Glazed Energy Storage Systems with Various Storage Materials: An Experimental study”, Sustainable Cities and Society, vol. 45, pp. 422-430, 2019.
B. Durakovic, “Design for Additive Manufacturing: Benefits, Trends and Challenges”, Periodicals of Engineering and Natural Sciences (PEN), vol. 6, pp. 179–191, 2018.
B. Durakovic, Demir, R., Abat, K., and Emek, C., “Lean Manufacturing: Trends and Implementation Issues”, Periodical of Engineering and Natural Sciences, vol. 6, no. 1, pp. 130-143 , 2018.
B. Durakovic, "Design of Experiments Application, Concepts, Examples: State of the Art," Periodicals of Engineering and Natural Scinces, vol. 5, no. 3, p. 421‒439, 2017.
DOI: http://dx.doi.org/10.21533/pen.v7i2.497
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 Nariman Jabbar Qasim, Saja Majeed Mohammed, Ali Sami Sosa, Israa Albarazanchi
This work is licensed under a Creative Commons Attribution 4.0 International License.
ISSN: 2303-4521
Digital Object Identifier DOI: 10.21533/pen
This work is licensed under a Creative Commons Attribution 4.0 International License