Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimisation algorithm in MANETs

B Subbiah, MS Obaidat, S Sriram, R Manoharn… - 2020 - IET
A mobile ad-hoc network (MANET) consists of set of mobile nodes and communication
devices to interact without any support of the infrastructure. Unlike wired networks, the …

Proposed GA-BFSS and logistic regression based intrusion detection system

P Ghosh, R Mitra - Proceedings of the 2015 third international …, 2015 - ieeexplore.ieee.org
Enormous growth in Internet Technology accelerates sharing of limitless data, service and
resources. But along with the innumerable benefits of Internet, a number of serious issues …

An intrusion detection system using modified-firefly algorithm in cloud environment

P Ghosh, D Sarkar, J Sharma… - International Journal of …, 2021 - igi-global.com
The present era is being dominated by cloud computing technology which provides services
to the users as per demand over the internet. Satisfying the needs of huge people makes the …

Retracted: Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs

S Balaji, MS Obaidat, S Suthir, M Rajesh… - IET …, 2021 - Wiley Online Library
Retraction:“Selection of intermediate routes for secure data communication systems using
graph theory application and grey wolf optimization algorithm in MANETs” by authors …

An approach towards multilevel and multiagent based intrusion detection system

A Biswas, M Sharma, T Poddder… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Due to massive expansion of network computer systemS it became very difficult to manage
those systems. Now a day's many intruders are present who take advantages of these …

[PDF][PDF] An alternative model of virtualization based intrusion detection system in cloud computing

P Ghosh, R Ghosh, R Dutta - International Journal of Scientific & …, 2014 - academia.edu
The massive jumps in technology led to the expansion of Cloud Computing as the most
accepted medium for communication but it has also increased the scope of attacks as well …

[PDF][PDF] A New Approach of Intrusion Detection System with a Combination of Multilevel and Multiagent

A Biswas, M Sharma - Citeseer
the internet systems are attacked by many intruders and the information in the network is not
safe here. So we need to protect the network from intruder and the intrusion detection …