![]() Lancaster, H.O.: The Chi-Squared Distribution. In: International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, Leipzig, Germany, pp. Nadeem, A., Howarth, M.: Adaptive intrusion detection and prevention of denial of service attacks in MANETs. International Journal of Network Security 12(2), 80–87 (2011) Kabiri, P., Aghaei, M.: Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks. Lauf, A., Peters, R.A., Robinson, W.H.: A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Networks. Nello, C., John, S.-T.: An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. IEEE Transactions on Dependable and Secure Computing 8(2), 233–245 (2011) Joseph, J.F.C., Lee, B.-S., Das, A., Seet, B.-C.: Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA. IEEE Transactions on Vehicular Technology 58(5), 2471–2481 (2009)ĭuda, R., Hart, P., Stork, D.: Pattern Classification and Scene Analysis. Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., Kato, N.: A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks. Computers & Security 30(1) (January 2011) Xenakis, C., Panos, C., Stavrakakis, I.: A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. IEEE Communications Surveys 7(4) (Fourth Quarter 2005) Keywordsĭjenouri, D., Khelladi, L., Badache, N.: A Survey of Security Issues in Mobile Ad Hoc Networks. The provided weaknesses and limitations, which are thoroughly examined in this paper, constitute open issues in the area of MANET security and will drive future research steps. This paper presents a comprehensive evaluation and comparison of the most recent literature in the area of anomaly detection for MANETs. However, this advantage is offset by a number of limitations such as high rates of false alarms, imposition of processing overhead, lack of adaptability under dynamic network conditions etc. Anomaly-based detection engines are a topic of ongoing interest in the research community, due to their advantage in detecting unknown attacks. Intrusion Detection Systems may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders. ![]() then I guess maybe put it all back together and test it out in driveway to see if water still enters the system.Mobile Ad Hoc Networks are susceptible to a variety of attacks that threaten their operation and the provided services. I am going to run a compression test today and also a leak-down test maybe on the cylinders to try and test the blown head gasket theory. I never put 2 and 2 together at the time. ![]() which it did "diesel" on me that day at the lake or the day before. Have been told that the "dieseling" theory shouldn't have caused it. Working on now dis-proving the blown headgasket theory. ![]() I have been told too many different things now to decide what to do. The risers and exhaust manifold look ok to me, there is no water in the oil, had alot of water in #8 and #5, but some in most all cylinders, both sides of motor. and done alot of investigating and testing, but still have not proved where the water came from. So far, I have removed the Risers, ordered new Riser gaskets, extracted 2 broken starter bolts (don't want to do that again). I have a 2001 Four Winns 5.7GS and have encountered the dreaded hydrolock in the middle of the lake. I have been reading all the threads about water leaks, hydrolocks, etc. what do you experts think? Is it really, really, possible for the "dieseling" to cause water to suck back thru the exhaust? Thanks !!!!!! then I guess maybe put it all back together and test it out in driveway to see if water still enters the system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |