-
1
-
-
0034546898
-
Intrusion Detection in Wireless Ad Hoc Networks
-
Boston, MA, Aug.
-
Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad Hoc Networks," the 6th Annual Int'l Conf. on Mobile Computing and Networking (MobiCom'00), Boston, MA, Aug., 2000, pp. 275-283.
-
(2000)
The 6th Annual Int'l Conf. on Mobile Computing and Networking (MobiCom'00)
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
2
-
-
0037629724
-
Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies
-
Providence, RI, May
-
Y. Huang, W. Fan, W. Lee, and P. S. Yu, "Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies," Proc. of the 23rd International Conference on Distributed Computing Systems, Providence, RI, May 2003, pp. 478-487.
-
(2003)
Proc. of the 23rd International Conference on Distributed Computing Systems
, pp. 478-487
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.S.4
-
3
-
-
0242527339
-
Mobility Helps Security in Ad Hoc Networks
-
Annapolis, MD, June
-
S. Capkun, J. P. Hubaux and L. Buttyn, "Mobility Helps Security in Ad Hoc Networks," in Proc. of the 4th ACM Symp. on Mobile Ad Hoc Networking and Computing (MobiHOC'03), Annapolis, MD, June, 2003.
-
(2003)
Proc. of the 4th ACM Symp. on Mobile Ad Hoc Networking and Computing (MobiHOC'03)
-
-
Capkun, S.1
Hubaux, J.P.2
Buttyn, L.3
-
4
-
-
84952307800
-
Routing Anomaly Detection in Mobile Ad Hoc Networks
-
Dallas, TX, Oct. 20-22
-
B. Sun. K. Wu, and U. Pooch, "Routing Anomaly Detection in Mobile Ad Hoc Networks," 12th International Conference on Computer Communications and Networks (ICCCN'03), Dallas, TX, Oct. 20-22, 2003.
-
(2003)
12th International Conference on Computer Communications and Networks (ICCCN'03)
-
-
Sun, B.1
Wu, K.2
Pooch, U.3
-
5
-
-
84958760133
-
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules
-
LNCS 2119, Springer-Verlag
-
H. Goto, M. Mambo, H. Shizuya, and Y. Watanabe. "Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules," in Information Security and Privacy (ACISP2001), LNCS 2119, Springer-Verlag. 2001, pp.145-158.
-
(2001)
Information Security and Privacy (ACISP2001)
, pp. 145-158
-
-
Goto, H.1
Mambo, M.2
Shizuya, H.3
Watanabe, Y.4
-
6
-
-
0003597247
-
-
Feb., IETF Internet Draft
-
J. Broch, D. Johnson, and D. Maltz, The Dynamic Source Routing Protocol for Mobile Ad hoc Networks, http://www, ietf. org-/internet-drafts /draft-ietf-manet-dsr-07.txt, Feb. 2002, IETF Internet Draft.
-
(2002)
The Dynamic Source Routing Protocol for Mobile Ad hoc Networks
-
-
Broch, J.1
Johnson, D.2
Maltz, D.3
-
7
-
-
0032659921
-
A Peer-to-Peer zone-based two-level link state routing for mobile Ad Hoc Networks
-
Aug.
-
M. Joa-Ng and I. Lu, "A Peer-to-Peer zone-based two-level link state routing for mobile Ad Hoc Networks," in IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, Aug., 1999, pp. 1415-1425.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1415-1425
-
-
Joa-Ng, M.1
Lu, I.2
-
8
-
-
0032690749
-
CEDAR: A Core-Extraction Distributed Ad Hoc Routing Algorithm
-
Special Issue on Wireless Ad Hoc Networks, Aug.
-
R. Sivakumar, P. Sinha, and V. Bharghavan, "CEDAR: A Core-Extraction Distributed Ad Hoc Routing Algorithm." IEEE Journal on Selected Areas in Communications, Special Issue on Wireless Ad Hoc Networks, vol. 17, no. 8, Aug. 1999, pp.1454-1465.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1454-1465
-
-
Sivakumar, R.1
Sinha, P.2
Bharghavan, V.3
-
9
-
-
0031652485
-
GloMoSim: A Library for Parallel Simulation of Large-Scale Wireless Networks
-
Banff, Canada, May 26-29
-
X. Zeng, R. Bagrodia, and M. Gerla. "GloMoSim: a Library for Parallel Simulation of Large-Scale Wireless Networks," Proc. of the 12th Workshop on Parallel and Distributed Simulations (PADS '98), Banff, Canada, May 26-29, 1998, pp. 154-161.
-
(1998)
Proc. of the 12th Workshop on Parallel and Distributed Simulations (PADS '98)
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
10
-
-
0018918171
-
An Algorithm for Vector Quantizer Design
-
Jan.
-
Y. Linde, A. Buzo, and R. M. Gray, "An Algorithm for Vector Quantizer Design," IEEE Trans. on Communications, Jan. 1980, pp. 702-710.
-
(1980)
IEEE Trans. on Communications
, pp. 702-710
-
-
Linde, Y.1
Buzo, A.2
Gray, R.M.3
-
12
-
-
84862048098
-
-
Computer Associates, E-Trust Intrusion Detection, Available at http://www3.ca.com/Solutions/Product.asp?ID=163, 2003.
-
(2003)
E-trust Intrusion Detection
-
-
-
13
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Boston, MA, Aug.
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," the 6th Annual Int'l Conf. on Mobile Computing and Networking (MobiCom'00), Boston, MA, Aug. 2000, pp. 255 - 265.
-
(2000)
The 6th Annual Int'l Conf. on Mobile Computing and Networking (MobiCom'00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
14
-
-
0004225165
-
Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition
-
June
-
D. Curry and H. Debar, "Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition," Internet Draft, June, 2002.
-
(2002)
Internet Draft
-
-
Curry, D.1
Debar, H.2
-
16
-
-
84922794799
-
Managing alerts in a multi-intrusion detection environment
-
New Orleans, LA, Dec. 10-14
-
F. Cuppens, "Managing alerts in a multi-intrusion detection environment," in 17th Annual Computer Security Applications Conf., New Orleans, LA, Dec. 10-14, 2001.
-
(2001)
17th Annual Computer Security Applications Conf.
-
-
Cuppens, F.1
-
17
-
-
0036079912
-
Alert Correlation in a Cooperative Intrusion Detection Framework
-
Berkeley, CA
-
F. Cuppens, and A. Mige, "Alert Correlation in a Cooperative Intrusion Detection Framework," in IEEE Symp. on Security and Privacy, Berkeley, CA, 2002, pp. 202-215.
-
(2002)
IEEE Symp. on Security and Privacy
, pp. 202-215
-
-
Cuppens, F.1
Mige, A.2
-
19
-
-
84958963784
-
Analyzing Intensive Intrusion Alerts Via Correlation
-
LNCS 2516, Zurich, Switzerland, Oct.
-
P. Ning, Y. Cui, and D. S. Reeves, "Analyzing Intensive Intrusion Alerts Via Correlation," in Proc. of the 5th Int. Symp. on Recent Advances in Intrusion Detection (RAID'02), LNCS 2516, Zurich, Switzerland, Oct., 2002, pp.74-94.
-
(2002)
Proc. of the 5th Int. Symp. on Recent Advances in Intrusion Detection (RAID'02)
, pp. 74-94
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
20
-
-
77956988169
-
M2D2: A Formal Data Model for IDS Alert Correlation
-
LNCS 2516, Zurich, Switzerland, Oct. 16-18
-
B. Morin. L. M, H. Debar, and M. Ducass, "M2D2: A Formal Data Model for IDS Alert Correlation," in Proc. of the 5th Int. Symp. on Recent Advances in Intrusion Detection (RAID'02), LNCS 2516, Zurich, Switzerland, Oct. 16-18, 2002, pp. 115-137.
-
(2002)
Proc. of the 5th Int. Symp. on Recent Advances in Intrusion Detection (RAID'02)
, pp. 115-137
-
-
Morin, B.1
Debar, L.M.H.2
Ducass, M.3
|