메뉴 건너뛰기




Volumn , Issue , 2003, Pages 69-78

Alert Aggregation in Mobile Ad Hoc Networks

Author keywords

Alert Aggregation; Intrusion Detection; Mobile Ad Hoc Networks; Routing Security

Indexed keywords

ALGORITHMS; BUFFER STORAGE; COMPUTER SIMULATION; CORRELATION METHODS; GATEWAYS (COMPUTER NETWORKS); INFORMATION ANALYSIS; NETWORK PROTOCOLS; PROBABILITY DISTRIBUTIONS; ROUTERS; TOPOLOGY;

EID: 1542377708     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/941311.941323     Document Type: Conference Paper
Times cited : (58)

References (20)
  • 5
    • 84958760133 scopus 로고    scopus 로고
    • Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules
    • LNCS 2119, Springer-Verlag
    • H. Goto, M. Mambo, H. Shizuya, and Y. Watanabe. "Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules," in Information Security and Privacy (ACISP2001), LNCS 2119, Springer-Verlag. 2001, pp.145-158.
    • (2001) Information Security and Privacy (ACISP2001) , pp. 145-158
    • Goto, H.1    Mambo, M.2    Shizuya, H.3    Watanabe, Y.4
  • 7
    • 0032659921 scopus 로고    scopus 로고
    • A Peer-to-Peer zone-based two-level link state routing for mobile Ad Hoc Networks
    • Aug.
    • M. Joa-Ng and I. Lu, "A Peer-to-Peer zone-based two-level link state routing for mobile Ad Hoc Networks," in IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, Aug., 1999, pp. 1415-1425.
    • (1999) IEEE Journal on Selected Areas in Communications , vol.17 , Issue.8 , pp. 1415-1425
    • Joa-Ng, M.1    Lu, I.2
  • 8
    • 0032690749 scopus 로고    scopus 로고
    • CEDAR: A Core-Extraction Distributed Ad Hoc Routing Algorithm
    • Special Issue on Wireless Ad Hoc Networks, Aug.
    • R. Sivakumar, P. Sinha, and V. Bharghavan, "CEDAR: A Core-Extraction Distributed Ad Hoc Routing Algorithm." IEEE Journal on Selected Areas in Communications, Special Issue on Wireless Ad Hoc Networks, vol. 17, no. 8, Aug. 1999, pp.1454-1465.
    • (1999) IEEE Journal on Selected Areas in Communications , vol.17 , Issue.8 , pp. 1454-1465
    • Sivakumar, R.1    Sinha, P.2    Bharghavan, V.3
  • 12
    • 84862048098 scopus 로고    scopus 로고
    • Computer Associates, E-Trust Intrusion Detection, Available at http://www3.ca.com/Solutions/Product.asp?ID=163, 2003.
    • (2003) E-trust Intrusion Detection
  • 14
    • 0004225165 scopus 로고    scopus 로고
    • Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition
    • June
    • D. Curry and H. Debar, "Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition," Internet Draft, June, 2002.
    • (2002) Internet Draft
    • Curry, D.1    Debar, H.2
  • 16
    • 84922794799 scopus 로고    scopus 로고
    • Managing alerts in a multi-intrusion detection environment
    • New Orleans, LA, Dec. 10-14
    • F. Cuppens, "Managing alerts in a multi-intrusion detection environment," in 17th Annual Computer Security Applications Conf., New Orleans, LA, Dec. 10-14, 2001.
    • (2001) 17th Annual Computer Security Applications Conf.
    • Cuppens, F.1
  • 17
    • 0036079912 scopus 로고    scopus 로고
    • Alert Correlation in a Cooperative Intrusion Detection Framework
    • Berkeley, CA
    • F. Cuppens, and A. Mige, "Alert Correlation in a Cooperative Intrusion Detection Framework," in IEEE Symp. on Security and Privacy, Berkeley, CA, 2002, pp. 202-215.
    • (2002) IEEE Symp. on Security and Privacy , pp. 202-215
    • Cuppens, F.1    Mige, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.