  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/3082</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>An Intelligent IDS for Mobile Adhoc Networks using Differential Evolutionary and Navie Bayesin Algorithms</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Assistant Professor (Sr.Gr), Department of Electronics and Communication Engineering University College of Engineering, BIT Campus, Anna University, Tiruchirappalli, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>R.</given_name>
    <surname>R.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor(Sr .Gr), Department of Computer Science and Engineering, School of Computing, Vel Tech Rangarajan Dr. Sagunthala R&amp;D Institute of Science and Technology, Chennai, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>K.</given_name>
    <surname>Nithya</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor, Department of  Information Technology Panimalar Engineering College Chennai , India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>V.</given_name>
    <surname>Kandasamy</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor, Department of  Computer Science and Engineering, University College of Engineering Pattukkottai, Tamil Nadu,	India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>R. Kiruba</given_name>
    <surname>buri</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Professor, Department of Electronics and Communication Engineering, R.M.D.Engineering College,Chennai, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>A. Sumaiya</given_name>
    <surname>Begum</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Ad-hoc Networks are structure less, auto-designing, self mending and dynamic in nature. The manet geography which are more helpless to have security issues and clearly self important to different kinds of assaults. The IDS framework has been created in manet to address the different assaults in Ad-hoc networks. Irregularity interruption recognition is bothered with ready to distinguishing occasions that give off an impression of being confused assaults. In contrast to single and gathering of nodes, causes assaults may cause all the more destroying impacts on remote conditions. To guard against different shared assaults. In this paper, we propose 'An Intelligent IDS  for mobile adhoc network using Differential Evolutionary and Navie Bayesian algorithm (DEANB)‘ calculation.  The proposed framework is for the most part centers to identify and forestall the malevolent node in Ad-hoc organizes and arrange the believed node utilizing the NB  idea and node choice is upgraded utilizing DE calculation. This proposed framework which likewise diminishes the bogus positive pace of Ad-hoc nodes and expands the reliability of the node took part in dynamic systems. The proposed framework can identify wormhole, dark opening, flooding and specific bundle drop and furthermore builds the exhibition of system as far as various boundaries like throughput, directing over-head, start to finish postponement and packet conveyance proportion, and so forth. In this way the recreations in NS-2 shows that the proposed framework has impressively diminishes the vindictive trouble making of nodes in networks.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>50</first_page>
   <last_page>61</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.150105</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/3082</resource>
  </doi_data>
 </journal_article>
</journal>
