-
1
-
-
26744432427
-
Authenticated ad hoc routing at the link layer for mobile systems
-
Technical Report 96-3, Portalnd State University, Computer Science
-
J. Binkley, Authenticated ad hoc routing at the link layer for mobile systems, Technical Report 96-3, Portalnd State University, Computer Science (1996).
-
(1996)
-
-
Binkley, J.1
-
2
-
-
23044520423
-
Neural fraud detection in mobile phone operations
-
A. Boukerche and M.S.M.A. Notare, Neural fraud detection in mobile phone operations, in: Proceedings of the IPDPS 2000 Workshop, Cancun, Mexico, May 1-5 (2000) pp. 636-644.
-
(2000)
Proceedings of the IPDPS 2000 Workshop, Cancun, Mexico, May 1-5
, pp. 636-644
-
-
Boukerche, A.1
Notare, M.S.M.A.2
-
3
-
-
0003597247
-
The dynamic source routing protocol for mobile adhocnetworks
-
Internet Draft, draft-ietf-manet-dsr-01.txt (December)
-
J. Broch, D. Johnson and D. Maltz, The dynamic source routing protocol for mobile adhocnetworks, Internet Draft, draft-ietf-manet-dsr-01.txt (December 1998).
-
(1998)
-
-
Broch, J.1
Johnson, D.2
Maltz, D.3
-
4
-
-
85149612939
-
Fast effective rule induction
-
W.W. Cohen, Fast effective rule induction, in: Proceedings of the 12th International Conference on Machine Learning (Morgan Kaufmann, San Mateo, CA, 1995) pp. 115-123.
-
Proceedings of the 12th International Conference on Machine Learning (Morgan Kaufmann, San Mateo, CA, 1995)
, pp. 115-123
-
-
Cohen, W.W.1
-
7
-
-
0029716418
-
A sense of self for Unix processes
-
(IEEE Computer Society Press, New York)
-
S. Forrest, S.A. Hofmeyr, A. Somayaji and T.A. Longstaff, A sense of self for Unix processes, in: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA (IEEE Computer Society Press, New York, 1996) pp. 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
8
-
-
0003478316
-
The architecture of a network level intrusion detection system
-
Technical Report, Computer Science Department, University of New Mexico (August)
-
R. Heady, G. Luger, A. Maccabe and M. Servilla, The architecture of a network level intrusion detection system, Technical Report, Computer Science Department, University of New Mexico (August 1990).
-
(1990)
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
10
-
-
0013029399
-
MANET authentication architecture
-
Internet Draft, draft-jacobs-imep-auth-arch-01.txt (February); expired at 2000
-
S. Jacobs and M.S. Corson, MANET authentication architecture, Internet Draft, draft-jacobs-imep-auth-arch-01.txt (February 1999) expired at 2000.
-
(1999)
-
-
Jacobs, S.1
Corson, M.S.2
-
11
-
-
0043220723
-
Mobile IP authentication, authorization, and accounting requirements
-
Request for Comments 2977, Internet Engineering Task Force (October)
-
S. Jacobs, S. Glass, T. Hiller and C. Perkins, Mobile IP authentication, authorization, and accounting requirements, Request for Comments 2977, Internet Engineering Task Force (October 2000).
-
(2000)
-
-
Jacobs, S.1
Glass, S.2
Hiller, T.3
Perkins, C.4
-
14
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
eds. T. Imielinski and H. Korth (Kluwer Academic, Dordrecht)
-
D.B. Johnson and D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in: Mobile Computing, eds. T. Imielinski and H. Korth (Kluwer Academic, Dordrecht, 1996) pp. 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
15
-
-
0034266911
-
Location-aided routing (LAR) in mobile ad hoc networks
-
extended version of the MobiCom'98 paper
-
Y.-B. Ko and N.H. Vaidya, Location-aided routing (LAR) in mobile ad hoc networks, ACM/Baltzer Wireless Networks (WINET) 6(4) (2000), extended version of the MobiCom'98 paper.
-
(2000)
ACM/Baltzer Wireless Networks (WINET)
, vol.6
, Issue.4
-
-
Ko, Y.-B.1
Vaidya, N.H.2
-
19
-
-
0003451777
-
A real-time intrusion detection expert system (IDES) - Final technical report
-
Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA (February)
-
T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes and T. Garvey, A real-time intrusion detection expert system (IDES) - final technical report, Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA (February 1992).
-
(1992)
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.5
Javitz, H.6
Valdes, A.7
Garvey, T.8
-
20
-
-
0032667063
-
The effects of on-demand behavior in routing protocols for multi-hop wireless ad hoc networks
-
D.A. Maltz, J. Broch, J. Jetcheva and D.B. Johnson, The effects of on-demand behavior in routing protocols for multi-hop wireless ad hoc networks, IEEE Journal on Selected Areas in Communications 17(8) (1999) 1439-1453.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1439-1453
-
-
Maltz, D.A.1
Broch, J.2
Jetcheva, J.3
Johnson, D.B.4
-
24
-
-
0343344010
-
Experiences with disconnected operation in a mobile environment
-
(August)
-
M. Satyanarayanan, J.J. Kistler, L.B. Mummert, M.R. Ebling, P. Kumar and Q. Lu, Experiences with disconnected operation in a mobile environment, in: Proceedings of USENIX Symposium on Mobile and Location Independent Computing, Cambridge, MA (August 1993) pp. 11-28.
-
(1993)
Proceedings of USENIX Symposium on Mobile and Location Independent Computing, Cambridge, MA
, pp. 11-28
-
-
Satyanarayanan, M.1
Kistler, J.J.2
Mummert, L.B.3
Ebling, M.R.4
Kumar, P.5
Lu, Q.6
-
25
-
-
0030695529
-
Securing distance-vector routing protocols
-
(February)
-
B.R. Smith, S. Murthy and J.J. Garcia-Luna-Aceves, Securing distance-vector routing protocols, in: Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA (February 1997) pp. 85-92.
-
(1997)
Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA
, pp. 85-92
-
-
Smith, B.R.1
Murthy, S.2
Garcia-Luna-Aceves, J.J.3
-
26
-
-
0003902869
-
Secured routing protocol for ad-hoc networks
-
Master's Thesis, University of Cincinnati, OH (March)
-
L. Venkatraman, Secured routing protocol for ad-hoc networks, Master's Thesis, University of Cincinnati, OH (March 2000).
-
(2000)
-
-
Venkatraman, L.1
-
27
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z.J. Haas, Securing ad hoc networks, IEEE Network 13(6) (1999) 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|