-
2
-
-
33847350059
-
-
L. Breiman. Probability. Society for Industrial and Applied Mathematics, Philadelphia, PA, 1992. Unabridged, corrected republication of the work first published by Addison-Wesley Publishing Company, Inc., Reading, MA, 1968.
-
L. Breiman. Probability. Society for Industrial and Applied Mathematics, Philadelphia, PA, 1992. Unabridged, corrected republication of the work first published by Addison-Wesley Publishing Company, Inc., Reading, MA, 1968.
-
-
-
-
3
-
-
0035728158
-
The Monitoring, Detection, Interpretation and Response Paradigm for the Security of Battlespace Networks
-
Washington, DC, October
-
J. B. D. Cabrera, L. J. Popyack, Jr., L. Lewis, B. Ravichandran, and R. K. Mehra. The Monitoring, Detection, Interpretation and Response Paradigm for the Security of Battlespace Networks. In Proceedings of IEEE MILCOM 2001, Washington, DC, October 2001.
-
(2001)
Proceedings of IEEE MILCOM 2001
-
-
Cabrera, J.B.D.1
Popyack Jr., L.J.2
Lewis, L.3
Ravichandran, B.4
Mehra, R.K.5
-
4
-
-
0033712953
-
Statistical Traffic Modeling for Network Intrusion Detection
-
San Francisco, CA, August, IEEE Computer Society
-
J. B. D. Cabrera, B. Ravichandran, and R. K. Mehra. Statistical Traffic Modeling for Network Intrusion Detection. In Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, pages 466-473, San Francisco, CA, August 2000. IEEE Computer Society.
-
(2000)
Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
, pp. 466-473
-
-
Cabrera, J.B.D.1
Ravichandran, B.2
Mehra, R.K.3
-
5
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
T. Camp, J. Boleng, and V. Davies. A survey of mobility models for ad hoc network research. Wireless Communications & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, 2(5):483-502, 2002.
-
(2002)
Wireless Communications & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
7
-
-
0032657544
-
ANMP: Ad Hoc Network Management Protocol
-
W. Chen, N. Jain, and S. Singh. ANMP: Ad Hoc Network Management Protocol. IEEE Journal on Selected Areas in Communications, 17(8): 1506-1531, 1999.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1506-1531
-
-
Chen, W.1
Jain, N.2
Singh, S.3
-
9
-
-
0037629724
-
-
Y.-A. Huang, W. Fan, W. Lee, and P. S. Yu. Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. In Proceedings of the 23th International Conference on Distributed Computing Systems, Providence, RI, May 2003.
-
Y.-A. Huang, W. Fan, W. Lee, and P. S. Yu. Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. In Proceedings of the 23th International Conference on Distributed Computing Systems, Providence, RI, May 2003.
-
-
-
-
11
-
-
0003938947
-
Optimized Link-State Routing Protocol (draft-ietf-manet-olsr00.txt)
-
Technical report, MANET IETF drafts, November 1998. available at
-
P. Jacquet, P. Muhlethaler, and A. Qayyum. Optimized Link-State Routing Protocol (draft-ietf-manet-olsr00.txt). Technical report, MANET IETF drafts, November 1998. available at http://www.ietf.org/proceedings/99mar/I-D/draft- ietf-manet-olsr-00.txt.
-
-
-
Jacquet, P.1
Muhlethaler, P.2
Qayyum, A.3
-
12
-
-
0142063407
-
Novelty Detection: A Review. Part I: Statistical Approaches; Part 11: Neural Network Based Approaches
-
December
-
M. Markou and S. Singh. Novelty Detection: A Review. Part I: Statistical Approaches; Part 11: Neural Network Based Approaches. Signal Processing, 83(12):2481-2521, December 2003.
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2481-2521
-
-
Markou, M.1
Singh, S.2
-
14
-
-
84903836776
-
How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
-
West Point, New York
-
P. Ning and K. Sun. How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols. In Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, West Point, New York, 2003.
-
(2003)
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
-
-
Ning, P.1
Sun, K.2
-
16
-
-
0038048503
-
Integrating Intrusion Detection and Network Management
-
Florence, Italy, April
-
X. Qin, W. Lee, L. Lewis, and J. B. D. Cabrera. Integrating Intrusion Detection and Network Management. In Proceedings of the Eighth IEEE/IFIP Network Operations and Management Symposium, pages 329-344, Florence, Italy, April 2002.
-
(2002)
Proceedings of the Eighth IEEE/IFIP Network Operations and Management Symposium
, pp. 329-344
-
-
Qin, X.1
Lee, W.2
Lewis, L.3
Cabrera, J.B.D.4
-
18
-
-
0019596509
-
-
R. R. Tenney and N. R. Sandell, Jr. Detection with Distributed Sensors. IEEE Transactions on Aerospace and Electronic Systems, 17(4):501-510, July 1981.
-
R. R. Tenney and N. R. Sandell, Jr. Detection with Distributed Sensors. IEEE Transactions on Aerospace and Electronic Systems, 17(4):501-510, July 1981.
-
-
-
-
19
-
-
0003462953
-
-
John Wiley & Sons
-
H. L. van Trees. Detection, Estimation, and Modulation Theory - Part I: Detection, Estimation, and Linear Modulation Theory. John Wiley & Sons, 1968.
-
(1968)
Detection, Estimation, and Modulation Theory - Part I: Detection, Estimation, and Linear Modulation Theory
-
-
van Trees, H.L.1
-
21
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
September
-
Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks, 9(5):545-556, September 2003.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
|