scispace - formally typeset
M

M. Rmayti

Researcher at University of Technology of Troyes

Publications -  6
Citations -  80

M. Rmayti is an academic researcher from University of Technology of Troyes. The author has contributed to research in topics: Optimized Link State Routing Protocol & Denial-of-service attack. The author has an hindex of 4, co-authored 6 publications receiving 61 citations. Previous affiliations of M. Rmayti include Centre national de la recherche scientifique.

Papers
More filters
Journal ArticleDOI

A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks

TL;DR: A fully decentralized mechanism that allows a node to monitor and detect neighbors that are malicious even if they have a changing behavior, based on a Bernoulli Bayesian model for nodes behavior classification and a Markov chain model for behavior evolution tracking is proposed.
Proceedings ArticleDOI

Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers

TL;DR: This paper proposes a novel approach of watchdog based on two Bayesian filters: Bernoulli and Multinomial, which are used in a complementary manner to successfully detect the packet dropping attacks in mobile ad hoc networks.
Proceedings ArticleDOI

Flooding attacks detection in MANETs

TL;DR: A statistical approach to defense against RREQ flooding attacks in MANETs is proposed and results prove that these attacks can be detected with a low rate of false alerts.
Proceedings ArticleDOI

Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)

TL;DR: A novel detection model is proposed to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not, based on the fact that the Worm hole tunnel reduces significantly the length of the paths passing through it.
Proceedings ArticleDOI

Denial of Service (DoS) attacks detection in MANETs through statistical models

TL;DR: A novel approach based on two Bayesian classification models: Bernoulli and Multinomial is proposed to detect Grayhole attack, which occurs when a malicious node drop some of received data packets during the route discovery process.