메뉴 건너뛰기




Volumn 2007, Issue , 2005, Pages

An intrusion detection system for suburban ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

CARRIER COMMUNICATION; CRYPTOGRAPHY; INFORMATION ANALYSIS; INTRUSION DETECTION; NETWORK PROTOCOLS; PACKET NETWORKS;

EID: 34249341133     PISSN: 21593442     EISSN: 21593450     Source Type: Conference Proceeding    
DOI: 10.1109/TENCON.2005.300979     Document Type: Conference Paper
Times cited : (4)

References (22)
  • 3
    • 1642326644 scopus 로고    scopus 로고
    • Bypassing the Home Computing Bottleneck: The Suburban Area Network
    • Feb
    • R. Pose, C. Kopp. Bypassing the Home Computing Bottleneck: The Suburban Area Network. 3rd Australasian Computer Architecture Conference, pages 87-100, Feb 1998.
    • (1998) 3rd Australasian Computer Architecture Conference , pp. 87-100
    • Pose, R.1    Kopp, C.2
  • 4
    • 28344441933 scopus 로고    scopus 로고
    • M. M. Islam, R. Pose, C. Kopp. A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-Hoc Networks. LNCS, Springer-Verlag, Berlin, Germany, pages 395-4-07, 2003.
    • M. M. Islam, R. Pose, C. Kopp. A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-Hoc Networks. LNCS, Springer-Verlag, Berlin, Germany, pages 395-4-07, 2003.
  • 7
    • 85080394055 scopus 로고    scopus 로고
    • Making SAHN-MAC Independent of Single Frequency Channel and Omnidirectional Antennas
    • Apr
    • M. M. Islam, R. Pose, C. Kopp. Making SAHN-MAC Independent of Single Frequency Channel and Omnidirectional Antennas. In IASTED NCS, Apr 2005.
    • (2005) IASTED NCS
    • Islam, M.M.1    Pose, R.2    Kopp, C.3
  • 8
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Mobile Computing and Networking, pages 275-283, 2000.
    • (2000) Mobile Computing and Networking , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 9
    • 0034449688 scopus 로고    scopus 로고
    • Techniques for Intrusion-Resistant Ad hoc Routing Algorithms (TIARA)
    • Oct
    • R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom and K. Thurber. Techniques for Intrusion-Resistant Ad hoc Routing Algorithms (TIARA). In MILCOM, volume 2. pages 660-664. Oct 2000.
    • (2000) MILCOM , vol.2 , pp. 660-664
    • Ramanujan, R.1    Ahamad, A.2    Bonney, J.3    Hagelstrom, R.4    Thurber, K.5
  • 10
    • 85177502880 scopus 로고    scopus 로고
    • S. Marti and T. J. Giuli and K. Lai and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000.
    • S. Marti and T. J. Giuli and K. Lai and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000.
  • 11
    • 84954161437 scopus 로고    scopus 로고
    • Enforcing service availability in mobile ad-hoc WANs
    • Aug
    • L. Buttyán and J. P. Hubaux. Enforcing service availability in mobile ad-hoc WANs. In IEEE/ACM MobiHOC, pages 87-96, Aug 2000.
    • (2000) IEEE/ACM MobiHOC , pp. 87-96
    • Buttyán, L.1    Hubaux, J.P.2
  • 13
    • 0035178273 scopus 로고    scopus 로고
    • Security Enhancements in AODV protocol for Wireless Ad Hoc Networks
    • Fall
    • S. Bhargava and D. P. Agrawal. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks. In VTC, volume 4, pages 2143-2147. Fall 2001.
    • (2001) VTC , vol.4 , pp. 2143-2147
    • Bhargava, S.1    Agrawal, D.P.2
  • 19
    • 2442597363 scopus 로고    scopus 로고
    • Performance Analysis of the CONFIDANT Protocol
    • June
    • S. Buchegger, J-Y. L. Boudec. Performance Analysis of the CONFIDANT Protocol. In ACM MobiHoc. pages 455-465. June 2002.
    • (2002) ACM MobiHoc , pp. 455-465
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 20
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks
    • Sep
    • P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In IFIP CMS, Sep 2002.
    • (2002) IFIP CMS
    • Michiardi, P.1    Molva, R.2
  • 21
    • 85080368262 scopus 로고    scopus 로고
    • TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks
    • Mar
    • K. Balakrishnan, J. Deng, P. K. Varhney. TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. In IEEE WCNC. Mar 2005.
    • (2005) IEEE WCNC
    • Balakrishnan, K.1    Deng, J.2    Varhney, P.K.3
  • 22
    • 13244276488 scopus 로고    scopus 로고
    • Secure routing in mobile wireless ad hoc networks
    • July
    • Siddhartha Gupte and Mukesh Singhal. Secure routing in mobile wireless ad hoc networks. Elsevier, 1(1):151-174, July 2003.
    • (2003) Elsevier , vol.1 , Issue.1 , pp. 151-174
    • Gupte, S.1    Singhal, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.