-
1
-
-
84858536594
-
-
[Online]
-
[Online]. Available: http://www.esoft.com/products/instagatesoftpaks1.cfm
-
-
-
-
2
-
-
84858536592
-
-
[Online]
-
[Online]. Available:http://www.microsoft.com/technet/security/bulletin/ms00-066.mspx
-
-
-
-
3
-
-
27544471466
-
-
Rockland, MA: Syngress, ch. 10
-
J. Beale, A. R. Baker, B. Caswell, and M. Poor, Snort 2.1 Intrusion Detection, 2nd ed. Rockland, MA: Syngress, 2004, ch. 10.
-
(2004)
Snort 2.1 Intrusion Detection, 2nd Ed.
-
-
Beale, J.1
Baker, A.R.2
Caswell, B.3
Poor, M.4
-
4
-
-
33144487946
-
Turning 802.11 inside-out
-
Jan.
-
P. Bhagwat, B. Raman, and D. Sanghi, "Turning 802.11 inside-out," Proc. ACM SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, pp. 33-38, Jan. 2004.
-
(2004)
Proc. ACM SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.1
, pp. 33-38
-
-
Bhagwat, P.1
Raman, B.2
Sanghi, D.3
-
5
-
-
0034976472
-
GPS-free positioning in mobile ad hoc networks
-
S. Capkun, M. Hamdi, and J. P. Hubaux, "GPS-free positioning in mobile ad hoc networks," in Proc. 34th Ann. Hawaii Int. Conf. System Sci., vol. 9, 2001, pp. 3481-3490.
-
(2001)
Proc. 34th Ann. Hawaii Int. Conf. System Sci.
, vol.9
, pp. 3481-3490
-
-
Capkun, S.1
Hamdi, M.2
Hubaux, J.P.3
-
7
-
-
1642309265
-
-
Indianapolis, IN: New Riders, ch. 6
-
E. Cole, Hackers Beware. Indianapolis, IN: New Riders, 2001, ch. 6.
-
(2001)
Hackers Beware
-
-
Cole, E.1
-
8
-
-
0023294428
-
An intrusion detection model
-
Feb.
-
D. Denning, "An intrusion detection model," IEEE Trans. Softw. Eng., vol. 13, pp. 222-232, Feb. 2001.
-
(2001)
IEEE Trans. Softw. Eng.
, vol.13
, pp. 222-232
-
-
Denning, D.1
-
9
-
-
0003991982
-
-
Sebastopol, CA: O'Reilly and Associates, ch. 19
-
S. Garfinkel and G. Spafford, Practical UNIX and Internet Security, 3rd ed. Sebastopol, CA: O'Reilly and Associates, 2003, ch. 19.
-
(2003)
Practical UNIX and Internet Security, 3rd Ed.
-
-
Garfinkel, S.1
Spafford, G.2
-
11
-
-
19544390827
-
System health and intrusion monitoring using a hierarchy of constraints
-
Oct.
-
C. Ko, P. Brutch, J. Rowe, G. Tsafnat, and K. Levitt, "System health and intrusion monitoring using a hierarchy of constraints," in Proc. 4th Int. Symp., Recent Advances in Intrusion Detection, Oct. 2001, pp. 190-204.
-
(2001)
Proc. 4th Int. Symp., Recent Advances in Intrusion Detection
, pp. 190-204
-
-
Ko, C.1
Brutch, P.2
Rowe, J.3
Tsafnat, G.4
Levitt, K.5
-
12
-
-
11244289227
-
On k-coverage in a mostly sleeping sensor network
-
Sep.
-
S. Kumar, T. Lai, and J. Balogh, "On k-coverage in a mostly sleeping sensor network," in Proc. ACM MobiCom, Sep. 2004, pp. 144-158.
-
(2004)
Proc. ACM MobiCom
, pp. 144-158
-
-
Kumar, S.1
Lai, T.2
Balogh, J.3
-
13
-
-
1542358969
-
Ucan: A unified cellular and ad-hoc network architecture
-
Sep.
-
H. Luo, R. Ramjee, P. Sinha, L. Li, and S. Lu, "Ucan: A unified cellular and ad-hoc network architecture," in Proc. ACM MobiCom, Sep. 2003, pp. 353-367.
-
(2003)
Proc. ACM MobiCom
, pp. 353-367
-
-
Luo, H.1
Ramjee, R.2
Sinha, P.3
Li, L.4
Lu, S.5
-
14
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Aug.
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM MobiCom, Aug. 2000, pp. 255-265.
-
(2000)
Proc. ACM MobiCom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
15
-
-
0012127229
-
Intrusion and intrusion detection
-
J. McHugh, "Intrusion and intrusion detection," Int. J. Inf. Security, vol. 1, no. 1, pp. 14-35, 2001.
-
(2001)
Int. J. Inf. Security
, vol.1
, Issue.1
, pp. 14-35
-
-
McHugh, J.1
-
16
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Portoroz, Slovenia, Sep.
-
P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. Commun. Multimedia Security Conf., Portoroz, Slovenia, Sep. 2002, pp. 107-121.
-
(2002)
Proc. Commun. Multimedia Security Conf.
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
17
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Jul.
-
D. Wagner, N. Borisov, and I. Goldberg, "Intercepting mobile communications: The insecurity of 802.11," in Proc. ACM MobiCom, Jul. 2001, pp. 180-189.
-
(2001)
Proc. ACM MobiCom
, pp. 180-189
-
-
Wagner, D.1
Borisov, N.2
Goldberg, I.3
-
18
-
-
0036999061
-
Intrusion-resistant ad hoc wireless networks
-
Oct.
-
R. Ramanujan, S. Kudige, T. Nguyen, S. Takkella, and F. Adelstein, "Intrusion-resistant ad hoc wireless networks," in Proc. MilCom, vol. 2, Oct. 2002, pp. 890-894.
-
(2002)
Proc. MilCom
, vol.2
, pp. 890-894
-
-
Ramanujan, R.1
Kudige, S.2
Nguyen, T.3
Takkella, S.4
Adelstein, F.5
-
19
-
-
0842331554
-
Detecting of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
-
Dec.
-
R. Rao and G. Kesidis, "Detecting of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited," in Proc. IEEE GLOBECOM, Dec. 2003, pp. 2957-2961.
-
(2003)
Proc. IEEE GLOBECOM
, pp. 2957-2961
-
-
Rao, R.1
Kesidis, G.2
-
20
-
-
0242696192
-
Performance analysis of the confidant protocol: Cooperation of nodes - Fairness in dynamic ad-hoc networks
-
Jun.
-
J. Y. L. Boudec and S. Buchegger, "Performance analysis of the confidant protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks," in Proc. IEEE/ACM Symp. Mobile Ad Hoc Netw. Comput., Jun. 2002, pp. 226-236.
-
(2002)
Proc. IEEE/ACM Symp. Mobile Ad Hoc Netw. Comput.
, pp. 226-236
-
-
Boudec, J.Y.L.1
Buchegger, S.2
-
21
-
-
0041939724
-
Unreliable sensor grids: Coverage, connectivity and diameter
-
Apr.
-
S. Shakkottai, R. Srikant, and N. Shroff, "Unreliable sensor grids: Coverage, connectivity and diameter," in Proc. IEEE INFOCOM, vol. 2, Apr. 2003, pp. 1073-1083.
-
(2003)
Proc. IEEE INFOCOM
, vol.2
, pp. 1073-1083
-
-
Shakkottai, S.1
Srikant, R.2
Shroff, N.3
-
22
-
-
0004231341
-
-
Philadelphia, PA: Society for Industrial and Applied Mathematics
-
H. Solomon, Geometric Probability. Philadelphia, PA: Society for Industrial and Applied Mathematics, 1978.
-
(1978)
Geometric Probability
-
-
Solomon, H.1
-
23
-
-
0003324496
-
Stream control transmission protocol
-
Oct.
-
R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson, "Stream control transmission protocol," RFC 2960, Oct. 2000.
-
(2000)
RFC
, vol.2960
-
-
Stewart, R.1
Xie, Q.2
Morneault, K.3
Sharp, C.4
Schwarzbauer, H.5
Taylor, T.6
Rytina, I.7
Kalla, M.8
Zhang, L.9
Paxson, V.10
-
24
-
-
84961923803
-
Domination and coverage guarantees through distributed computation
-
Champaign, IL, Sep.
-
D. Subhadrabandhu, F. Anjum, S. Kannan, and S. Sarkar, "Domination and coverage guarantees through distributed computation," in Proc. 43rd Ann. Allerton Conf. Commun., Control, Comput., Champaign, IL, Sep. 2005.
-
(2005)
Proc. 43rd Ann. Allerton Conf. Commun., Control, Comput.
-
-
Subhadrabandhu, D.1
Anjum, F.2
Kannan, S.3
Sarkar, S.4
-
25
-
-
20344385478
-
Efficacy of misuse detection in ad hoc networks
-
Univ. Pennsylvania, Philadelphia, PA, Jun.
-
D. Subhadrabandhu, S. Sarkar, and F. Anjum, "Efficacy of misuse detection in ad hoc networks," Univ. Pennsylvania, Philadelphia, PA, Tech. Rep., Jun. 2004.
-
(2004)
Tech. Rep.
-
-
Subhadrabandhu, D.1
Sarkar, S.2
Anjum, F.3
-
27
-
-
84963002204
-
On the least number of unit circles which can cover a square
-
S. Verblunsky, "On the least number of unit circles which can cover a square," J. London Math. Soc., vol. 24, pp. 164-170, 1949.
-
(1949)
J. London Math. Soc.
, vol.24
, pp. 164-170
-
-
Verblunsky, S.1
-
28
-
-
4444255460
-
On deriving the upper bound of alpha-lifetime for large sensor networks
-
May
-
H. Zhang and J. Hou, "On deriving the upper bound of alpha-lifetime for large sensor networks," in Proc. IEEE/ACM Symp. Mobile Ad Hoc Netw. Comput., May 2004, pp. 121-132.
-
(2004)
Proc. IEEE/ACM Symp. Mobile Ad Hoc Netw. Comput.
, pp. 121-132
-
-
Zhang, H.1
Hou, J.2
-
29
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Aug.
-
Y. Zhang and W. Lee, "Intrusion detection in wireless ad-hoc networks," in Proc. ACM MobiCom, Aug. 2000, pp. 275-283.
-
(2000)
Proc. ACM MobiCom
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
|