Optimized link state routing protocol (OLSR), " IETF experimental RFC 3626, 2003. ,
Property Based Intrusion Detection to Secure OLSR, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07), 2007. ,
DOI : 10.1109/ICWMC.2007.72
Fast Effective Rule Induction, ICML, 1995. ,
DOI : 10.1016/B978-1-55860-377-6.50023-2
An effective intrusion detection approach for OLSR MANET protocol, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)., 2005. ,
DOI : 10.1109/NPSEC.2005.1532054
Autonomic trust reasoning enables misbehavior detection in OLSR, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, 2008. ,
DOI : 10.1145/1363686.1364173
URL : https://hal.archives-ouvertes.fr/hal-00353032
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks, 20th Annual Computer Security Applications Conference, 2004. ,
DOI : 10.1109/CSAC.2004.6
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols, Ad Hoc Network, vol.3, issue.6, 2005. ,
Trust-Based Countermeasures for Securing OLSR Protocol, 2009 International Conference on Computational Science and Engineering, 2009. ,
DOI : 10.1109/CSE.2009.130
Performance comparison of AODV and OLSR in vanets urban environments under realistic mobility patterns, IFIP Med-Hoc-Net workshop, 2006. ,
A Specification-Based Intrusion Detection Model for OLSR, RAID, 2008. ,
DOI : 10.1007/11663812_17
Intrusion detection in wireless ad-hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000. ,
DOI : 10.1145/345910.345958
Making large-scale support vector machine learning practical, 1999. ,
Detecting blackholes attack on AODV-based mobile ad hoc networks by dynamic learning method, International journal of network security, vol.5, issue.3, 2007. ,
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks, International Journal of Information Security, vol.7, issue.1, 2007. ,
DOI : 10.1007/s10207-007-0035-9
Cross-feature analysis for detecting ad-hoc routing anomalies, IEEE ICDCS, 2003. ,
C4.5: programs for machine learning, 1993. ,
Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks, Information Fusion, vol.9, issue.1, 2008. ,
DOI : 10.1016/j.inffus.2007.03.001