-
1
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", In Proceedings of IEEE ICNP, 2002.
-
(2002)
Proceedings of IEEE ICNP
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
4
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
K. Ilgun, R. Kemmerer, and P. Porras, "State Transition Analysis: A Rule-based Intrusion Detection Approach", IEEE Transactions of Software Engineering, 2(13):181-199, March 1995.
-
(1995)
IEEE Transactions of Software Engineering
, vol.2
, Issue.13
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
9
-
-
33750311917
-
SAFE: Securing pAcket forwarding in ad hoc nEtworks
-
June/July, Paris, France
-
Y. Rebahi, V. Mujica, C. Simons, D. Sisalem, "SAFE: Securing pAcket Forwarding in ad hoc nEtworks", 5th Workshop on Applications and Services in Wireless Networks, June/July 2005, Paris, France
-
(2005)
5th Workshop on Applications and Services in Wireless Networks
-
-
Rebahi, Y.1
Mujica, V.2
Simons, C.3
Sisalem, D.4
-
11
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
October
-
Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, and Karl Levitt, "A Specification-Based Intrusion Detection System For AODV," In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (S ASN'03), October 2003.
-
(2003)
Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (S ASN'03)
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
13
-
-
84866985446
-
Securing the OLSR protocol
-
Mahdia, Tunisia, June 25-27
-
C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P. Mühlethaler, and D. Raffo, "Securing the OLSR Protocol", Med-Hoc-Net 2003, Mahdia, Tunisia, June 25-27, 2003
-
(2003)
Med-hoc-net 2003
-
-
Adjih, C.1
Clausen, T.2
Jacquet, P.3
Laouiti, A.4
Mühlethaler, P.5
Raffo, D.6
-
14
-
-
35248850385
-
A specification-based intrusion detection model for OLSR
-
Seattle, WA, September 7-9
-
Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl Levitt, "A Specification-based Intrusion Detection Model for OLSR", Proceeding of the 8th International Symposium, RAID 2005; Recent Advances in Intrusion Detection, Seattle, WA, September 7-9, 2005
-
(2005)
Proceeding of the 8th International Symposium, RAID 2005; Recent Advances in Intrusion Detection
-
-
Tseng, C.H.1
Song, T.2
Balasubramanyam, P.3
Ko, C.4
Levitt, K.5
-
16
-
-
2442551009
-
Optimized link state routing protocol
-
T. Clausen and P. Jacquet, "Optimized Link State Routing Protocol.", IETF RFC 3626
-
IETF RFC
, vol.3626
-
-
Clausen, T.1
Jacquet, P.2
-
17
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
David Johnson, David Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks", Mobile Computing, 1996
-
(1996)
Mobile Computing
-
-
Johnson, D.1
Maltz, D.2
-
18
-
-
84870706779
-
Ad Hoc on Demand Distance Vector (AODV) routing
-
Charles E. Perkins, Elizabeth M. Belding-Royer, and Samir Das. "Ad Hoc On Demand Distance Vector (AODV) Routing." IETF RFC 3561
-
IETF RFC
, vol.3561
-
-
Perkins, C.E.1
Belding-Royer, E.M.2
Das, S.3
-
19
-
-
79952796959
-
A secure routing protocol for ad hoc networks
-
March
-
Kimaya Sanzgiri, Bridget Dahill, Daniel LaFlamme, Brian Neil Le vine, Clay Shields, and Elizabeth Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", Journal of Selected Areas of Communications (JSAC) Special Issue on Ad hoc Networks. March 2005
-
(2005)
Journal of Selected Areas of Communications (JSAC) Special Issue on Ad Hoc Networks
-
-
Sanzgiri, K.1
Dahill, B.2
LaFlamme, D.3
Le Vine, B.N.4
Shields, C.5
Belding-Royer, E.6
-
21
-
-
10444224907
-
Attack analysis and detection for ad hoc routing protocols
-
Yi-an Huang, Wenke Lee, "Attack Analysis and Detection for Ad Hoc Routing Protocols", RAID 2004
-
RAID 2004
-
-
Huang, Y.-A.1
Lee, W.2
-
22
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
RSA Laboratories, Summer/Fall 2002
-
Perrig, R. Canetti, D. Tygar and D. Song, "The TESLA broadcast authentication protocol," In Cryptobytes (RSA Laboratories, Summer/Fall 2002), 5(2):2-13, 2002.
-
(2002)
Cryptobytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig1
Canetti, R.2
Tygar, D.3
Song, D.4
-
24
-
-
24944479711
-
Topology broadcast based on reverse-path forwarding
-
R. Ogier, F. Templin, M. Lewis, "Topology Broadcast based on Reverse-Path Forwarding", IETF RFC 3684
-
IETF RFC
, vol.3684
-
-
Ogier, R.1
Templin, F.2
Lewis, M.3
-
25
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y.C. Hu, A. Perrig, D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks", Proceedings of INFOCOM, 2003
-
(2003)
Proceedings of INFOCOM
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
|