메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA ACQUISITION; DATA PROCESSING; LEARNING SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33847372974     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2005.1605939     Document Type: Conference Paper
Times cited : (25)

References (21)
  • 2
    • 33847350059 scopus 로고    scopus 로고
    • L. Breiman. Probability. Society for Industrial and Applied Mathematics, Philadelphia, PA, 1992. Unabridged, corrected republication of the work first published by Addison-Wesley Publishing Company, Inc., Reading, MA, 1968.
    • L. Breiman. Probability. Society for Industrial and Applied Mathematics, Philadelphia, PA, 1992. Unabridged, corrected republication of the work first published by Addison-Wesley Publishing Company, Inc., Reading, MA, 1968.
  • 3
    • 0035728158 scopus 로고    scopus 로고
    • The Monitoring, Detection, Interpretation and Response Paradigm for the Security of Battlespace Networks
    • Washington, DC, October
    • J. B. D. Cabrera, L. J. Popyack, Jr., L. Lewis, B. Ravichandran, and R. K. Mehra. The Monitoring, Detection, Interpretation and Response Paradigm for the Security of Battlespace Networks. In Proceedings of IEEE MILCOM 2001, Washington, DC, October 2001.
    • (2001) Proceedings of IEEE MILCOM 2001
    • Cabrera, J.B.D.1    Popyack Jr., L.J.2    Lewis, L.3    Ravichandran, B.4    Mehra, R.K.5
  • 9
    • 0037629724 scopus 로고    scopus 로고
    • Y.-A. Huang, W. Fan, W. Lee, and P. S. Yu. Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. In Proceedings of the 23th International Conference on Distributed Computing Systems, Providence, RI, May 2003.
    • Y.-A. Huang, W. Fan, W. Lee, and P. S. Yu. Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. In Proceedings of the 23th International Conference on Distributed Computing Systems, Providence, RI, May 2003.
  • 11
    • 0003938947 scopus 로고    scopus 로고
    • Optimized Link-State Routing Protocol (draft-ietf-manet-olsr00.txt)
    • Technical report, MANET IETF drafts, November 1998. available at
    • P. Jacquet, P. Muhlethaler, and A. Qayyum. Optimized Link-State Routing Protocol (draft-ietf-manet-olsr00.txt). Technical report, MANET IETF drafts, November 1998. available at http://www.ietf.org/proceedings/99mar/I-D/draft- ietf-manet-olsr-00.txt.
    • Jacquet, P.1    Muhlethaler, P.2    Qayyum, A.3
  • 12
    • 0142063407 scopus 로고    scopus 로고
    • Novelty Detection: A Review. Part I: Statistical Approaches; Part 11: Neural Network Based Approaches
    • December
    • M. Markou and S. Singh. Novelty Detection: A Review. Part I: Statistical Approaches; Part 11: Neural Network Based Approaches. Signal Processing, 83(12):2481-2521, December 2003.
    • (2003) Signal Processing , vol.83 , Issue.12 , pp. 2481-2521
    • Markou, M.1    Singh, S.2
  • 18
    • 0019596509 scopus 로고    scopus 로고
    • R. R. Tenney and N. R. Sandell, Jr. Detection with Distributed Sensors. IEEE Transactions on Aerospace and Electronic Systems, 17(4):501-510, July 1981.
    • R. R. Tenney and N. R. Sandell, Jr. Detection with Distributed Sensors. IEEE Transactions on Aerospace and Electronic Systems, 17(4):501-510, July 1981.
  • 21
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion Detection Techniques for Mobile Wireless Networks
    • September
    • Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks, 9(5):545-556, September 2003.
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.