Citation to this article as recorded by
Lee, S., Y. Lee and S.G. Yoo, 2012. A specification based intrusion detection mechanism for the LEACH protocol. Inform. Technol. J., 11: 40-48. CrossRefDirect Link |
Tao, F., W. Shuang and Y. Zhan-Ting, 2012. UC secure network coding against pollution attacks. Inform. Technol. J., 11: 1175-1183. CrossRefDirect Link |
Yoo, S.G., S. Lee, Y. Lee, Y.K. Yang and J. Kim, 2011. Enhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro. Inform. Technol. J., 10: 1882-1895. CrossRefDirect Link |
Citation to this article as recorded by
VANET Security and Privacy - An Overview SSRN Electronic Journal |
Enhanced Intrusion Detection System for PKMv2 EAP-AKA used in WiBro Information Technology Journal Vol. 10, Issue 10, 1882, 2011 |
A Specification Based Intrusion Detection Mechanism for the LEACH Protocol Information Technology Journal Vol. 11, Issue 1, 40, 2012 |
A Survey on VANET Intrusion Detection Systems International Journal of Applied Mathematics and Informatics |
How to cite this article
P.C. Kishore Raja, M. Suganthi and R. Sunder, 2008. Wireless Node Misbehavior Detection Using Genetic Algorithm. Information Technology Journal, 7: 143-148.
DOI: 10.3923/itj.2008.143.148
URL: https://scialert.net/abstract/?doi=itj.2008.143.148
DOI: 10.3923/itj.2008.143.148
URL: https://scialert.net/abstract/?doi=itj.2008.143.148