-
2
-
-
0004118143
-
A secure routing protocol for ad hoc networks
-
Department of Computer Science, University of Massachusetts, August
-
B. Dahill, B. N. Levine, E. Royer, and C. Shields, "A Secure Routing Protocol for Ad Hoc Networks," Technical Report 01-37, Department of Computer Science, University of Massachusetts, August 2001.
-
(2001)
Technical Report 01-37
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
4
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
September
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," in emphACM Workshop on Wireless Security 2003, pp. 30-40, September 2003.
-
(2003)
emphACM Workshop on Wireless Security 2003
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
0035271246
-
Authenticated ad hoc routing at the link layer for mobile systems
-
Kluwer Academic Publishers
-
J. Brinkley, and W. Trost, "Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems," Wireless Networks 7, pp. 139-145, Kluwer Academic Publishers, 2001.
-
(2001)
Wireless Networks
, vol.7
, pp. 139-145
-
-
Brinkley, J.1
Trost, W.2
-
6
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
August
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom'00), pp. 255-265, August 2000.
-
(2000)
Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom'00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
8
-
-
0037629724
-
Cross-feature analysis for detecting ad-hoc routing anomalies
-
Y. Huang, W. Fan, W. Lee, and P. S. Yu, "Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies," in Proceedings of the 23rd International Conference on Distributed Computing Systems, pp. 478, 2003.
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems
, pp. 478
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.S.4
-
13
-
-
4143084830
-
SVM-based intrusion detection sysem for wireless ad hoc networks
-
October
-
H. Deng, Q. Zeng, and D. P. Agrawal, "SVM-based Intrusion Detection Sysem for Wireless Ad Hoc Networks," in Proceedings of the IEEE Vehicular Technology Conference (VTC'03), Vol.3, pp. 2147-2151, October 2003.
-
(2003)
Proceedings of the IEEE Vehicular Technology Conference (VTC'03)
, vol.3
, pp. 2147-2151
-
-
Deng, H.1
Zeng, Q.2
Agrawal, D.P.3
-
15
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
October
-
C. Tseng, P. Balasubramanyam, C. Ko, r. Limprasittiporn, J. Rowe, and K. Levitt, "A Specification-based Intrusion Detection System for AODV," in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 125-134, October 2003.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 125-134
-
-
Tseng, C.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
17
-
-
0041973497
-
Packet leashes: A defense against wormhold attacks in wireless ad hoc networks
-
April
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense Against Wormhold Attacks in Wireless Ad Hoc Networks," in Proceedings of IEEE INFOCOM 2003, vol. 3, pp. 1976-1986, April 2003.
-
(2003)
Proceedings of IEEE INFOCOM 2003
, vol.3
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
18
-
-
27544460639
-
Mitigating byzantine attacks in ad hoc wireless networks
-
Center for Networking and Distributed Systems, Computer Science Department, Johns Hopkins University, March
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "Mitigating Byzantine Attacks in Ad Hoc Wireless Networks," Technical Report 1, Center for Networking and Distributed Systems, Computer Science Department, Johns Hopkins University, March 2004
-
(2004)
Technical Report
, vol.1
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
19
-
-
0001882616
-
Fast algorithms for mining association rules
-
Santiago, Chile, September
-
R. Agrawal, and R. Srikant, "Fast Algorithms for Mining Association Rules," in Proceeding of the 20th Ini'l Conference on Very Large Databases, pp. 487-499, Santiago, Chile, September 1994.
-
(1994)
Proceeding of the 20th Ini'l Conference on Very Large Databases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
20
-
-
0035007850
-
MAFIA: A maximal frequent itemset algorithm for transactional databases
-
April
-
D. Burdich, M. Calimlim, and J. Gehrke, "MAFIA: A maximal frequent itemset algorithm for transactional databases," in Proceedings of the 17th International Conference on Data Engineering (ICDE), pp. 443-452, April 2001.
-
(2001)
Proceedings of the 17th International Conference on Data Engineering (ICDE)
, pp. 443-452
-
-
Burdich, D.1
Calimlim, M.2
Gehrke, J.3
-
21
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
October
-
J. Broch, D. Maltz, D. Johnson, Y.-C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking (MobiCom'98), pp. 85-97, October, 1998.
-
(1998)
Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98)
, pp. 85-97
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.-C.4
Jetcheva, J.5
|