-
1
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Boston, MA
-
Zhang Y, Lee W. Intrusion detection in wireless ad-hoc networks. Proceedings of ACM MobiCom, Boston, MA, 2000; 275-283.
-
(2000)
Proceedings of ACM MobiCom
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
2
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
Bhuse V, Gupta A. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 2006; 15(1):33-51.
-
(2006)
Journal of High Speed Networks
, vol.15
, Issue.1
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
4
-
-
77954790951
-
Using artificial anomalies to detect unknown and known network intrusions
-
Fan W, Miller M, Stolfo S, Lee W, Chan P. Using artificial anomalies to detect unknown and known network intrusions. Knowledge and Information Systems 2004; 6(5):507-527.
-
(2004)
Knowledge and Information Systems
, vol.6
, Issue.5
, pp. 507-527
-
-
Fan, W.1
Miller, M.2
Stolfo, S.3
Lee, W.4
Chan, P.5
-
7
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang Y, Lee W, Huang Y. Intrusion detection techniques for mobile wireless networks. Wireless Networks Journal 2003; 9(5):545-556.
-
(2003)
Wireless Networks Journal
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
8
-
-
33749520207
-
IDS RainStorm: Visualizing IDS alarms
-
Minneapolis, Minnesota
-
Abdullah K, Lee C, Conti G, Copeland J, Stasko J. IDS RainStorm: visualizing IDS alarms. Proceedings of VizSEC, 2005, Minneapolis, Minnesota.
-
(2005)
Proceedings of VizSEC
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.4
Stasko, J.5
-
9
-
-
33749537716
-
Visual correlation of host processes and traffic
-
Minneapolis, Minnesota
-
Fink G, Muessig P, North C. Visual correlation of host processes and traffic. Proceedings of VizSEC 2005, Minneapolis, Minnesota.
-
(2005)
Proceedings of VizSEC
-
-
Fink, G.1
Muessig, P.2
North, C.3
-
10
-
-
33749519234
-
IDGraphs: Intrusion detection and analysis using histographs
-
Minneapolis, Minnesota
-
Ren P, Gao Y, Li Z, Chen Y, Watson B. IDGraphs: intrusion detection and analysis using histographs. Proceedings of VizSEC 2005, Minneapolis, Minnesota.
-
(2005)
Proceedings of VizSEC
-
-
Ren, P.1
Gao, Y.2
Li, Z.3
Chen, Y.4
Watson, B.5
-
11
-
-
33749532337
-
Preserving the big picture: Visual network traffic analysis with TNV
-
Minneapolis, Minnesota
-
Goodall J, Rheingans P, Lutters W, Komlodi A. Preserving the big picture: visual network traffic analysis with TNV. Proceedings of VizSEC 2005, Minneapolis, Minnesota.
-
(2005)
Proceedings of VizSEC
-
-
Goodall, J.1
Rheingans, P.2
Lutters, W.3
Komlodi, A.4
-
12
-
-
33749513452
-
A visualization methodology for characterization of network scans
-
Minneapolis, Minnesota
-
Muelder C, Ma K, Bartoletti T. A visualization methodology for characterization of network scans. Proceedings of VizSEC 2005, Minneapolis, Minnesota.
-
(2005)
Proceedings of VizSEC
-
-
Muelder, C.1
Ma, K.2
Bartoletti, T.3
-
13
-
-
0004118143
-
A secure routing protocol for ad hoc networks
-
Technical report CS-02-32, University of Massachusetts
-
Dahill B, Levine B, Royer E, Shields C. A secure routing protocol for ad hoc networks. Technical report CS-02-32, University of Massachusetts, 2001.
-
(2001)
-
-
Dahill, B.1
Levine, B.2
Royer, E.3
Shields, C.4
-
14
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
San Francisco, CA
-
Hu Y, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. Proceedings of IEEE NFOCOM 2003, San Francisco, CA.
-
(2003)
Proceedings of IEEE NFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
16
-
-
84977898401
-
Using directional antennas to prevent wormhole attacks
-
San Diego, California
-
Hu L, Evans D. Using directional antennas to prevent wormhole attacks. Proceedings of NDSS 2004, San Diego, California.
-
(2004)
Proceedings of NDSS
-
-
Hu, L.1
Evans, D.2
-
17
-
-
33144488116
-
Low-cost attacks against packet delivery localization and time synchronization services in under-water sensor networks
-
Cologne, Germany;
-
Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B. Low-cost attacks against packet delivery localization and time synchronization services in under-water sensor networks. Proceedings of ACM Wireless Security (WiSe) 2005; Cologne, Germany; 87-96.
-
(2005)
Proceedings of ACM Wireless Security (WiSe)
, pp. 87-96
-
-
Kong, J.1
Ji, Z.2
Wang, W.3
Gerla, M.4
Bagrodia, R.5
Bhargava, B.6
-
20
-
-
16244412939
-
Steerable, progressive multidimensional scaling
-
Austin, Texas
-
Williams M, Munzner T. Steerable, progressive multidimensional scaling. Proceedings of InfoVis 2004, Austin, Texas.
-
(2004)
Proceedings of InfoVis
-
-
Williams, M.1
Munzner, T.2
-
23
-
-
0013824247
-
Multidimensional scaling of similarity
-
Torgeson W. Multidimensional scaling of similarity. Psychometrika 1965; 30: 379-393.
-
(1965)
Psychometrika
, vol.30
, pp. 379-393
-
-
Torgeson, W.1
-
24
-
-
0242612017
-
Localization from mere connectivity
-
Annapolis, Maryland
-
Shang Y, Ruml W, Zhang Y, Fromherz M. Localization from mere connectivity. Proceedings of ACM MobiHoc 2003, Annapolis, Maryland.
-
(2003)
Proceedings of ACM MobiHoc
-
-
Shang, Y.1
Ruml, W.2
Zhang, Y.3
Fromherz, M.4
-
25
-
-
8344227634
-
Sensor positioning in wireless ad-hoc sensor networks with multidimensional scaling
-
Hong Kong
-
Ji X, Zha H. Sensor positioning in wireless ad-hoc sensor networks with multidimensional scaling. Proceedings of INFOCOM 2004, Hong Kong.
-
(2004)
Proceedings of INFOCOM
-
-
Ji, X.1
Zha, H.2
-
26
-
-
3042823513
-
Semidefinite programming for ad hoc wireless sensor network localization
-
Berkeley, CA
-
Biswas P, Ye Y. Semidefinite programming for ad hoc wireless sensor network localization. Proceedings of ACM/IEEE IPSN 2004, Berkeley, CA.
-
(2004)
Proceedings of ACM/IEEE IPSN
-
-
Biswas, P.1
Ye, Y.2
-
27
-
-
33845916834
-
-
Poovendran R, Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal on Wireless Networks (WINET) 2007, accepted for publication.
-
Poovendran R, Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal on Wireless Networks (WINET) 2007, accepted for publication.
-
-
-
-
28
-
-
0036953792
-
Robotics-based location sensing using wireless ethernet
-
Atlanta, GA
-
Ladd A, Bekris K, Rudys A, Marceau G, Kavraki L, Wallach D. Robotics-based location sensing using wireless ethernet. Proceedings of ACM MobiCom 2002, Atlanta, GA.
-
(2002)
Proceedings of ACM MobiCom
-
-
Ladd, A.1
Bekris, K.2
Rudys, A.3
Marceau, G.4
Kavraki, L.5
Wallach, D.6
-
30
-
-
0034775930
-
Dynamic fine-grained localization in ad-hoc networks of sensors
-
Long Beach, California
-
Savvides A, Han C, Srivastava M. Dynamic fine-grained localization in ad-hoc networks of sensors. Proceedings of MobiCom 2001, Long Beach, California.
-
(2001)
Proceedings of MobiCom
-
-
Savvides, A.1
Han, C.2
Srivastava, M.3
-
32
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
Fairfax, Virginia
-
Ball R, Fink G, Rathi A, Shah S, North C. Home-centric visualization of network traffic for security administration. Proceedings of ACM VizSEC 2004, Fairfax, Virginia.
-
(2004)
Proceedings of ACM VizSEC
-
-
Ball, R.1
Fink, G.2
Rathi, A.3
Shah, S.4
North, C.5
-
33
-
-
33749533756
-
A user-centered look at glyph-based security visualization
-
Minneapolis, Minnesota
-
Komlodi A, Rheingans P, Ayachit U, Goodall J, Joshi A. A user-centered look at glyph-based security visualization. Proceedings of VizSEC 2005, Minneapolis, Minnesota.
-
(2005)
Proceedings of VizSEC
-
-
Komlodi, A.1
Rheingans, P.2
Ayachit, U.3
Goodall, J.4
Joshi, A.5
-
34
-
-
20444484611
-
NVisionIP: Netflow visualizations of system state for security situational awareness
-
Fairfax, Virginia
-
Lakkaraju K, Yurcik W, Lee A, Bearavolu R, Li Y, Yin X. NVisionIP: Netflow visualizations of system state for security situational awareness. Proceedings of ACM VizSEC/DMSEC 2004, Fairfax, Virginia.
-
(2004)
Proceedings of ACM VizSEC/DMSEC
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.3
Bearavolu, R.4
Li, Y.5
Yin, X.6
-
36
-
-
20444495766
-
ProtVis: A tool for port-based detection of security events
-
Fairfax, Virginia
-
McPherson J, Ma K, Krystosk P, Bartoletti T, Christensen M. ProtVis: a tool for port-based detection of security events. Proceedings of ACM VizSEC/DMSEC 2004, Fairfax, Virginia.
-
(2004)
Proceedings of ACM VizSEC/DMSEC
-
-
McPherson, J.1
Ma, K.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
37
-
-
33749445428
-
Effectively visualizing large networks through sampling
-
Minneapolis, Minnesota
-
Rafiei D, Curial S. Effectively visualizing large networks through sampling. Proceedings of IEEE Visualization 2005, Minneapolis, Minnesota.
-
(2005)
Proceedings of IEEE Visualization
-
-
Rafiei, D.1
Curial, S.2
-
38
-
-
33645243543
-
A visualization paradigm for network intrusion detection
-
West Point, NY
-
Livnat Y, Agutter J, Moon S, Erbacher R, Foresti S. A visualization paradigm for network intrusion detection. Proceedings of the IEEE Information Assurance Workshop 2005; West Point, NY, 92-99.
-
(2005)
Proceedings of the IEEE Information Assurance Workshop
, pp. 92-99
-
-
Livnat, Y.1
Agutter, J.2
Moon, S.3
Erbacher, R.4
Foresti, S.5
-
39
-
-
34147120474
-
A note on two problems in connexion with graphs
-
Dljkstra EW. A note on two problems in connexion with graphs. Numerische Mathematik 1959; 1: 269-271.
-
(1959)
Numerische Mathematik
, vol.1
, pp. 269-271
-
-
Dljkstra, E.W.1
-
40
-
-
0030406791
-
A linear iteration time layout algorithm for visualizing high dimensional data
-
San Francisco, CA;
-
Chalmers M. A linear iteration time layout algorithm for visualizing high dimensional data. Proceedings IEEE Visualization 1996; San Francisco, CA; 127-132.
-
(1996)
Proceedings IEEE Visualization
, pp. 127-132
-
-
Chalmers, M.1
-
42
-
-
1542329085
-
Geographic routing without location information
-
San Diego, CA;
-
Rao A, Ratnasamy S, Papadimitriou C, Shenker S, Stoica I. Geographic routing without location information. Proceedings of ACM MobiCom 2003; San Diego, CA; 96-108.
-
(2003)
Proceedings of ACM MobiCom
, pp. 96-108
-
-
Rao, A.1
Ratnasamy, S.2
Papadimitriou, C.3
Shenker, S.4
Stoica, I.5
-
44
-
-
34247176956
-
-
IEC Workshop on Internet Simulations with the NS simulator 2000, San Diego, CA.
-
IEC Workshop on Internet Simulations with the NS simulator 2000, San Diego, CA.
-
-
-
-
45
-
-
26644463857
-
-
accessed 20 July, 2006
-
The Network Simulator - ns-2 http://www.isi.edu/nsnam/ns/ (accessed 20 July, 2006).
-
The Network Simulator - ns-2
-
-
-
46
-
-
3042802118
-
The node distribution of the random waypoint mobility model for wireless ad hoc networks
-
Bettstetter C, Resta G, Santi P. The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Transactions on Mobile Computing 2003; 2: 257-269.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, pp. 257-269
-
-
Bettstetter, C.1
Resta, G.2
Santi, P.3
|