메뉴 건너뛰기




Volumn , Issue , 2003, Pages 478-487

Cross-feature analysis for detecting ad-hoc routing anomalies

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; CORRELATION METHODS; DATA MINING; MOBILE TELECOMMUNICATION SYSTEMS; ROUTERS; SECURITY OF DATA; SIGNAL DETECTION; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION TRAFFIC;

EID: 0037629724     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (167)

References (17)
  • 1
    • 0003964874 scopus 로고
    • Next-generation intrusion detection expert system (NIDES): A summary
    • Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May
    • D. Anderson, T. Frivold, and A. Valdes. Next-generation intrusion detection expert system (NIDES): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May 1995.
    • (1995)
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 2
    • 0035271246 scopus 로고    scopus 로고
    • Authenticated ad hoc routing at the link layer for mobile systems
    • J. Binkley and W. Trost. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks, 7(2): 139-145, 2001.
    • (2001) Wireless Networks , vol.7 , Issue.2 , pp. 139-145
    • Binkley, J.1    Trost, W.2
  • 3
  • 7
    • 0003899978 scopus 로고    scopus 로고
    • The zone routing protocol (ZRP) for ad hoc networks
    • Internet draft draft-ietf-manetzone-zrp-04.txt, expired 2003, July
    • Z. Haas and M. R. Pearlman. The zone routing protocol (ZRP) for ad hoc networks. Internet draft draft-ietf-manetzone-zrp-04.txt, expired 2003, July 2000.
    • (2000)
    • Haas, Z.1    Pearlman, M.R.2
  • 10
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • In T. Imielinski and H. Korth, editors; Kluwer Academic Publishers
    • D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H. Korth, editors, Mobile Computing, pages 153-181. Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 11
  • 17
    • 0013294535 scopus 로고    scopus 로고
    • Secure routing protocols: Theory and practice
    • Technical report, North Carolina State University
    • F. Wang, B. Vetter, and S. F. Wu. Secure routing protocols: Theory and practice. Technical report, North Carolina State University, 2000.
    • (2000)
    • Wang, F.1    Vetter, B.2    Wu, S.F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.