-
1
-
-
0003516333
-
Intrusion Detection Systems: A Taxomomy and Survey
-
Dept. of Comp. Eng., Chalmers Univ. of Technology, Sweden, Mar. 20
-
S. Axelsson, "Intrusion Detection Systems: A Taxomomy and Survey," Tech. report no. 99-15, Dept. of Comp. Eng., Chalmers Univ. of Technology, Sweden, Mar. 20, 2003.
-
(2003)
Tech. Report No. 99-15
, vol.99
, Issue.15
-
-
Axelsson, S.1
-
2
-
-
84862351408
-
-
http://www.ietf.org/html.charters/idwg-charter.html
-
-
-
-
4
-
-
0035178273
-
Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks
-
Oct. 7-11
-
S. Bhargava and D. P. Agrawal, "Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks," VTC 2001 Fall, vol. 4, Oct. 7-11, 2001, pp. 2143-47.
-
(2001)
VTC 2001 Fall
, vol.4
, pp. 2143-2147
-
-
Bhargava, S.1
Agrawal, D.P.2
-
6
-
-
0034449688
-
Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA)
-
Oct. 22-25
-
R. Ramanujan et al., "Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA) " MILCOM 2000, vol. 2, Oct. 22-25, 2000, pp. 660-64.
-
(2000)
MILCOM 2000
, vol.2
, pp. 660-664
-
-
Ramanujan, R.1
-
7
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Boston, MA
-
S. Marti et al., "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. 6th Annual Int'l. Conf. Mobile Comp. and Net., Boston, MA, pp. 255-65.
-
Proc. 6th Annual Int'l. Conf. Mobile Comp. and Net.
, pp. 255-265
-
-
Marti, S.1
-
8
-
-
0000629443
-
Dynamic Source Routing in Ad Hoc Wireless Networks
-
T. Imielinski and H. Korth, Eds., Kluwer
-
D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, T. Imielinski and H. Korth, Eds., Kluwer, 1996, pp. 153-81.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
9
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Sept.
-
Y. Zhang, W. Lee, and Y.-A. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM J. Wireless Net., vol. 9, no. 5, Sept. 2003, pp. 545-56.
-
(2003)
ACM J. Wireless Net.
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
10
-
-
1842693637
-
A New Intrusion Detection Method based on Process Profiling
-
Jan. 28-Feb. 1
-
Y. Okazaki, I. Sato, and S. Goto, "A New Intrusion Detection Method based on Process Profiling," Proc. SAINT 2002., Jan. 28-Feb. 1, 2002, pp. 82-90.
-
(2002)
Proc. SAINT 2002.
, pp. 82-90
-
-
Okazaki, Y.1
Sato, I.2
Goto, S.3
-
11
-
-
21644434924
-
Security in Ad Hoc Networks: A General Intrusion Detection Architecture Enhancing Trust Based Approaches
-
Ciudad Real, Spain, Apr. 3-6
-
P. Albers et al., "Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches," 1st Int'l. Wksp. Wireless Info. Sys., Ciudad Real, Spain, Apr. 3-6, 2002.
-
(2002)
1st Int'l. Wksp. Wireless Info. Sys.
-
-
Albers, P.1
-
12
-
-
34547238643
-
An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks
-
May
-
A. B. Smith, "An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks," 5th Nat'l. Colloq. for Info. Sys. Sec. Education, May 2001.
-
(2001)
5th Nat'l. Colloq. for Info. Sys. Sec. Education
-
-
Smith, A.B.1
-
13
-
-
84950162203
-
Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
-
July 10-12
-
O. Kachirskl and R. Guha, "Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks," Knowledge Media Net., Proc. IEEE Wksp., July 10-12, 2002, pp. 153-58.
-
(2002)
Knowledge Media Net., Proc. IEEE Wksp.
, pp. 153-158
-
-
Kachirskl, O.1
Guha, R.2
|