Follow
Dr.Lincy Elizebeth Jim
Dr.Lincy Elizebeth Jim
Consultant at Biarri Networks
No verified email
Title
Cited by
Cited by
Year
Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes
LE Jim, N Islam, MA Gregory
Computers & Security 113, 102538, 2022
242022
Improvised MANET selfish node detection using artificial Immune system based decision tree
LE Jim, MA Gregory
2019 29th International Telecommunication Networks and Applications …, 2019
102019
A review of artificial immune system based security frameworks for MANET
LE Jim, MA Gregory
International Journal of Communications, Network and System Sciences 9 (01), 1, 2016
102016
Decision Tree based AIS strategy for Intrusion Detection in MANET
LE Jim, J Chacko
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 1191-1195, 2019
62019
An artificial immune system-based strategy to enhance reputation in MANETs
LE Jim, MA Gregory
Journal of Telecommunications and the Digital Economy 7 (1), 68-82, 2019
42019
AIS reputation mechanism in MANET
LE Jim, MA Gregory
2018 28th International Telecommunication Networks and Applications …, 2018
42018
Packet Storage Time attack-a novel routing attack in Mobile Ad hoc Networks
LE Jim, MA Gregory
2016 26th International Telecommunication Networks and Applications …, 2016
32016
State analysis of mobile ad hoc network nodes
LE Jim, MA Gregory
2015 International Telecommunication Networks and Applications Conference …, 2015
32015
Pain modelling in an artificial immune system based MANET
LE Jim, MA Gregory
2017 27th International Telecommunication Networks and Applications …, 2017
12017
Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack
LE Jim, MA Gregory
Journal of Telecommunications and the Digital Economy 5 (2), 61-74, 2017
12017
Artificial immune system based security algorithm for mobile ad hoc networks
L Jim
RMIT University, 2017
12017
Special Session For IEEE TENCON 2019 -Artificial Intelligence for Wireless Networks
DLE Jim
https://www.tencon2019.org/SS10.pdf, 2019
2019
A Grudger Based AIS Approach to Coerce Selfish Node Cooperation in MANET.
LE Jim, MA Gregory
Int. J. Netw. Secur. 20 (5), 914-922, 2018
2018
Local Arrangements Co-Chairs
H King, K Pawlikowski, HR Sirisena, S Yu, H Abbas, K Ahmed, AO Arafat, ...
The system can't perform the operation now. Try again later.
Articles 1–14