-
1
-
-
21644434924
-
Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
-
Ciudad Real, Spain, April
-
th International Conference on Enterprise Information Systems, pages 1-12, Ciudad Real, Spain, April 2002.
-
(2002)
th International Conference on Enterprise Information Systems
, pp. 1-12
-
-
Albers, P.1
Camp, O.2
Percher, J.-M.3
Jouga, B.4
Me, L.5
Puttini, R.6
-
2
-
-
84925368904
-
802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington DC, August
-
J. Bellardo and J. Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In Proceedings of the USENIX Security Symposium, pages 15-28, Washington DC, August 2003.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, J.2
-
5
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
H. Debar, M. Dacier, and A. Wespi. Towards a taxonomy of intrusion-detection systems. Computer Networks, 31(8):805-822, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
6
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA, September
-
th ACM International Conference on Mobile Computing and Networking (Mobicom), pages 12-23, Atlanta, GA, September 2002.
-
(2002)
th ACM International Conference on Mobile Computing and Networking (Mobicom)
, pp. 12-23
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
7
-
-
84961572484
-
Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks
-
Callicoon, NY, June
-
Y.-C. Hu, D. B. Johnson, and A. Perrig. Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks. In Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), pages 3-13, Callicoon, NY, June 2002.
-
(2002)
Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02)
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
8
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Transactions on Software Engineering, 21(3): 181-199, 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
9
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Riverside, CA, November
-
th IEEE International Conference on Network Protocols, pages 251-260, Riverside, CA, November 2001.
-
(2001)
th IEEE International Conference on Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
10
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, August
-
th International Conference on Mobile Computing and Networking, pages 255-265, Boston, MA, August 2000.
-
(2000)
th International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
11
-
-
0013046241
-
An initial security analysis of the IEEE 802.1X Protocol
-
Department of Computer Science, University of Maryland, February
-
A. Mishra and W. Arbaugh. An Initial Security Analysis of the IEEE 802. 1X Protocol. Technical Report, Department of Computer Science, University of Maryland, February 2002.
-
(2002)
Technical Report
-
-
Mishra, A.1
Arbaugh, W.2
-
13
-
-
0842283101
-
A Secure protocol for ad hoc networks
-
Paris, France, November
-
th IEEE International Conference on Network Protocols, Paris, France, November 2002.
-
(2002)
th IEEE International Conference on Network Protocols
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
14
-
-
84860956980
-
-
libnet
-
M. Schiffman. libnet. http://packetfactory.net/libnet/, 2002.
-
(2002)
-
-
Schiffman, M.1
-
17
-
-
77954507857
-
Designing and implementing a family of intrusion detection systems
-
Helsinki, Finland, September
-
G. Vigna, F. Valeur, and R. Kemmerer. Designing and Implementing a Family of Intrusion Detection Systems. In Proceedings of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2003), pages 88-97, Helsinki, Finland, September 2003.
-
(2003)
Proceedings of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2003)
, pp. 88-97
-
-
Vigna, G.1
Valeur, F.2
Kemmerer, R.3
-
19
-
-
0035789243
-
Security aware ad hoc routing for wireless networks
-
Long Beach, California, October
-
nd ACM Symposium on Mobile Ad Hoc Networking and Computing, Poster Session, pages 299-302, Long Beach, California, October 2001.
-
(2001)
nd ACM Symposium on Mobile Ad Hoc Networking and Computing, Poster Session
, pp. 299-302
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
20
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May/June
-
H. Yih-Chun and A.Perrig. A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine, 2(3):28-39, May/June 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.3
, pp. 28-39
-
-
Yih-Chun, H.1
Perrig, A.2
-
24
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6):24-30, 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|