-
1
-
-
85081442222
-
-
Proceedings of IEC Workshop on Internet Simulations with the NS simulator
-
Proceedings of IEC Workshop on Internet Simulations with the NS simulator, 2000.
-
(2000)
-
-
-
2
-
-
33749520207
-
-
K. Abdullah, C. Lee, G. Conti, J. Copeland, and J. Stasko. IDS RainStorm: Visualizing IDS Alarms. In Proc. of VizSEC, 2005.
-
K. Abdullah, C. Lee, G. Conti, J. Copeland, and J. Stasko. IDS RainStorm: Visualizing IDS Alarms. In Proc. of VizSEC, 2005.
-
-
-
-
3
-
-
84977830295
-
Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols
-
F. Anjum, D. Subhadrabandhu, and S. Sarkar. Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols. In Proc. of VTC, 2003.
-
(2003)
Proc. of VTC
-
-
Anjum, F.1
Subhadrabandhu, D.2
Sarkar, S.3
-
4
-
-
20444447760
-
Home-Centric Visualization of Network Traffic for Security Administration
-
R. Ball, G. Fink, A. Rathi, S. Shah, and C. North. Home-Centric Visualization of Network Traffic for Security Administration. In Proc. of ACM VizSEC/DMSEC, 2004.
-
(2004)
Proc. of ACM VizSEC/DMSEC
-
-
Ball, R.1
Fink, G.2
Rathi, A.3
Shah, S.4
North, C.5
-
6
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
V. Bhuse and A. Gupta. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks, 1(15), 2006.
-
(2006)
Journal of High Speed Networks
, vol.1
, Issue.15
-
-
Bhuse, V.1
Gupta, A.2
-
7
-
-
25644450392
-
Perfect Simulation and Stationarity of a Class of Mobility Models
-
J.-Y. Le Boudec and M. Vojnovic. Perfect Simulation and Stationarity of a Class of Mobility Models. In Proc. of IEEE Infocom, 2005.
-
(2005)
Proc. of IEEE Infocom
-
-
Le Boudec, J.-Y.1
Vojnovic, M.2
-
8
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation, pages 299-314, 2002.
-
(2002)
OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
12
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proc. of ACM CCS, pages 42-51, 2003.
-
(2003)
Proc. of ACM CCS
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
13
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of ACM CCS, pages 41-47, 2002.
-
(2002)
Proceedings of ACM CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
14
-
-
77954790951
-
Using Artificial Anomalies to Detect Unknown and Known Network Intrusions
-
W. Fan, M. Miller, S. Stolfo, W. Lee, and P. Chan. Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. Knowledge and Information Systems, 6(5), 2004.
-
(2004)
Knowledge and Information Systems
, vol.6
, Issue.5
-
-
Fan, W.1
Miller, M.2
Stolfo, S.3
Lee, W.4
Chan, P.5
-
16
-
-
21644483415
-
SHARP: An architecture for secure resource peering
-
Y. Fu, J. Chase, B. Chun, S. Schwab, and A. Vahdat. SHARP: an architecture for secure resource peering. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 133-148, 2003.
-
(2003)
SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles
, pp. 133-148
-
-
Fu, Y.1
Chase, J.2
Chun, B.3
Schwab, S.4
Vahdat, A.5
-
17
-
-
84948987263
-
Link Stability in Mobile Wireless Ad Hoc Networks
-
M. Gerharz, C. de Waal, M. Frank, and P. Martini. Link Stability in Mobile Wireless Ad Hoc Networks. In Proceedings of the IEEE Conference on Local Computer Networks (LCN), pages 30-39, 2002.
-
(2002)
Proceedings of the IEEE Conference on Local Computer Networks (LCN)
, pp. 30-39
-
-
Gerharz, M.1
de Waal, C.2
Frank, M.3
Martini, P.4
-
21
-
-
33646928154
-
Weighted waypoint mobility model and its impact on ad hoc networks
-
W. J. Hsu, K. Merchant, H. Shu, C. Hsu, and A. Helmy. Weighted waypoint mobility model and its impact on ad hoc networks. SIGMOBILE Mob. Comput. Commun. Rev., 9(1):59-63, 2005.
-
(2005)
SIGMOBILE Mob. Comput. Commun. Rev
, vol.9
, Issue.1
, pp. 59-63
-
-
Hsu, W.J.1
Merchant, K.2
Shu, H.3
Hsu, C.4
Helmy, A.5
-
22
-
-
33749533756
-
A User-Centered Look at Glyph-Based Security Visualization
-
A. Komlodi, P. Rheingans, U. Ayaehit, J. Goodall, and A. Joshi. A User-Centered Look at Glyph-Based Security Visualization. In Proc. of VizSEC, 2005.
-
(2005)
Proc. of VizSEC
-
-
Komlodi, A.1
Rheingans, P.2
Ayaehit, U.3
Goodall, J.4
Joshi, A.5
-
23
-
-
20444484611
-
NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness
-
K. Lakkaraju, W. Yurcik, A. Lee, R. Bearavolu, Y. Li, and X. Yin. NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness. In Proceedings of ACM VizSEC/DMSEC, 2004.
-
(2004)
Proceedings of ACM VizSEC/DMSEC
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.3
Bearavolu, R.4
Li, Y.5
Yin, X.6
-
24
-
-
84866469313
-
-
L. Lazos and R. Poovendran. SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73-100, 2005.
-
L. Lazos and R. Poovendran. SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73-100, 2005.
-
-
-
-
25
-
-
16644374371
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
D. Liu, P. Ning, and R. Li. Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security, 8(1):41-77, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
26
-
-
33645243543
-
A Visualization Paradigm for Network Intrusion Detection
-
Y. Livnat, J. Agutter, S. Moon, R. Erbacher, and S. Foresti. A Visualization Paradigm for Network Intrusion Detection. In Proceedings of the IEEE Information Asssurance Workshop, pages 92-99, 2005.
-
(2005)
Proceedings of the IEEE Information Asssurance Workshop
, pp. 92-99
-
-
Livnat, Y.1
Agutter, J.2
Moon, S.3
Erbacher, R.4
Foresti, S.5
-
27
-
-
17744389982
-
Multi-hop cellular networks: Architecture and protocols for best-effort and real-time communication
-
B. S. Manoj, R. Ananthapadmanabha, and C. Siva Ram Murthy. Multi-hop cellular networks: architecture and protocols for best-effort and real-time communication. J. Parallel Distrib. Comput., 65(6):767-791, 2005.
-
(2005)
J. Parallel Distrib. Comput
, vol.65
, Issue.6
, pp. 767-791
-
-
Manoj, B.S.1
Ananthapadmanabha, R.2
Siva Ram Murthy, C.3
-
28
-
-
20444495766
-
PortVis: A Tool for Port-Based Detection of Security Events
-
J. McPherson, K. Ma, P. Krystosk, T. Bartoletti, and M. Christensen. PortVis: A Tool for Port-Based Detection of Security Events. In Proc. of ACM VizSEC/DMSEC, 2004.
-
(2004)
Proc. of ACM VizSEC/DMSEC
-
-
McPherson, J.1
Ma, K.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
29
-
-
33749513452
-
A Visualization Methodology for Characterization of Network Scans
-
C. Muelder, K. Ma, and T. Bartoletti. A Visualization Methodology for Characterization of Network Scans. In Proc. of VizSEC, 2005.
-
(2005)
Proc. of VizSEC
-
-
Muelder, C.1
Ma, K.2
Bartoletti, T.3
-
30
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In IPSN '04: Proceedings of the third international symposium on Information processing in sensor networks, pages 259-268, 2004.
-
(2004)
IPSN '04: Proceedings of the third international symposium on Information processing in sensor networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
31
-
-
33749445428
-
Effectively Visualizing Large Networks Through Sampling
-
D. Rafiei and S. Curial. Effectively Visualizing Large Networks Through Sampling. In Proc. of IEEE Visualization, 2005.
-
(2005)
Proc. of IEEE Visualization
-
-
Rafiei, D.1
Curial, S.2
-
32
-
-
33749519234
-
ID Graphs: Intrusion Detection and Analysis Using Histographs
-
P. Ren, Y. Gao, Z. Li, Y. Chen, and B. Watson. ID Graphs: Intrusion Detection and Analysis Using Histographs. In Proc. of VizSEC, 2005.
-
(2005)
Proc. of VizSEC
-
-
Ren, P.1
Gao, Y.2
Li, Z.3
Chen, Y.4
Watson, B.5
-
34
-
-
79952569372
-
Secure Leader Election Algorithms for Wireless Ad Hoc Networks
-
S. Vasudevan, B. DeCleene, N. Immerman, J. Kurose, and D. Towsley. Secure Leader Election Algorithms for Wireless Ad Hoc Networks. In Proc. of IEEE DARPA Information Survivability Conference and Exposition (DISCEX), 2003.
-
(2003)
Proc. of IEEE DARPA Information Survivability Conference and Exposition (DISCEX)
-
-
Vasudevan, S.1
DeCleene, B.2
Immerman, N.3
Kurose, J.4
Towsley, D.5
-
36
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proc. of ACM MobiCom, pages 275-283, 2000.
-
(2000)
Proc. of ACM MobiCom
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
|