-
1
-
-
84860943885
-
-
http://www.microsoft.com/technet/security/bulletin/ms02-024.mspx.Website.
-
Website
-
-
-
3
-
-
4143141932
-
Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols
-
Oct.
-
F. Anjum, D. Subhadrabandhu, and S. Sarkar. Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In IEEE VTC2003-Fall, Oct. 2003.
-
(2003)
IEEE VTC2003-Fall
-
-
Anjum, F.1
Subhadrabandhu, D.2
Sarkar, S.3
-
7
-
-
1642309265
-
-
New Riding Publishing
-
Eric Cole. Hackers Beware. New Riding Publishing, 2001.
-
(2001)
Hackers Beware
-
-
Cole, E.1
-
13
-
-
19544390827
-
System health and intrusion monitoring using a hierarchy of constraints
-
Oct.
-
C. Ko, P. Brutch, J. Rowe, G. Tsafnat, and K. Levitt. System health and intrusion monitoring using a hierarchy of constraints. In 4th International Symposium, Recent Advances in Intrusion Detection, pages 190-204, Oct. 2001.
-
(2001)
4th International Symposium, Recent Advances in Intrusion Detection
, pp. 190-204
-
-
Ko, C.1
Brutch, P.2
Rowe, J.3
Tsafnat, G.4
Levitt, K.5
-
17
-
-
10644289075
-
A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva. A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Comminication and Multimedia Security Conference), 2002.
-
(2002)
Comminication and Multimedia Security Conference
-
-
Michiardi, P.1
Molva, R.2
-
19
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
an SNI Technical Report, Jan.
-
T. Ptacek and T. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, an SNI Technical Report, Jan. 1998.
-
(1998)
Technical Report
-
-
Ptacek, T.1
Newsham, T.2
-
20
-
-
0036999061
-
Intrusion-resistant ad hoc wireless networks
-
Oct.
-
R. Ramanujan, S. Kudige, T. Nguyen, S. Takkella, and F. Adelstein. Intrusion-resistant ad hoc wireless networks. In Proceedings of MILCOM, Oct. 2002.
-
(2002)
Proceedings of MILCOM
-
-
Ramanujan, R.1
Kudige, S.2
Nguyen, T.3
Takkella, S.4
Adelstein, F.5
-
21
-
-
0842331554
-
Detection of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
-
R. Rao and G. Kesidis. Detection of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited. In Brazilian Journal of Telecomunications, 2003.
-
(2003)
Brazilian Journal of Telecomunications
-
-
Rao, R.1
Kesidis, G.2
-
23
-
-
0003324496
-
Stream control transmission protocol
-
Oct.
-
R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson. Stream control transmission protocol. RFC 2960, Oct. 2000.
-
(2000)
RFC
, vol.2960
-
-
Stewart, R.1
Xie, Q.2
Morneault, K.3
Sharp, C.4
Schwarzbauer, H.5
Taylor, T.6
Rytina, I.7
Kalla, M.8
Zhang, L.9
Paxson, V.10
-
24
-
-
20344385478
-
Efficacy of misuse detection in adhoc networks
-
University of Pennsylvania Technical Report, June
-
D. Subhadrabandhu, S. Sarkar, and F. Anjum. Efficacy of misuse detection in adhoc networks. Technical report, University of Pennsylvania Technical Report, June 2004.
-
(2004)
Technical Report
-
-
Subhadrabandhu, D.1
Sarkar, S.2
Anjum, F.3
|