Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/2575
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMenaria, Sumitra-
dc.contributor.authorValiveti, Sharada-
dc.contributor.authorKotecha, K.-
dc.date.accessioned2011-07-29T08:54:37Z-
dc.date.available2011-07-29T08:54:37Z-
dc.date.issued2010-10-
dc.identifier.urihttp://hdl.handle.net/123456789/2575-
dc.descriptionInternational Journal of Computer Applications, Vol. 8 (9), October, 2010, Page No. 11-16en_US
dc.description.abstractIn recent years ad hoc networks are widely used because of mobility and open architecture nature. But new technology always comes with its own set of problems. Security of ad hoc network is an area of widespread research in recent years. Some unique characteristics of ad hoc network itself are an immense dilemma in the way of security. In this paper we have presented study about characteristics of ad hoc network, how they are problematic in ad hoc network security, attacks in ad hoc network and brief description of some existing intrusion detection system. We have also justified why distributed intrusion detection is better for ad hoc network with comparative study of existing intrusion detections in ad hoc network.en_US
dc.relation.ispartofseriesITFCE004-1en_US
dc.subjectAd hoc Networksen_US
dc.subjectSecurityen_US
dc.subjectIDSen_US
dc.subjectDIDSen_US
dc.subjectComputer Faculty Paperen_US
dc.subjectFaculty Paperen_US
dc.subjectITFCE004en_US
dc.subjectITDIR001-
dc.titleComparative study of Distributed Intrusion Detection in Ad-hoc Networksen_US
dc.typeFaculty Papersen_US
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCE004-1.pdfITFCE004-1213.19 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.