-
2
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Sept
-
Y. Zhang, W. Lee, and Y. A. Huang, 'Intrusion Detection Techniques for Mobile Wireless Networks', ACM J. Wireless Net., vol. 9, no. 5, Sept. 2003, pp.545-56
-
(2003)
ACM J. Wireless Net
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.A.3
-
3
-
-
1842665110
-
Intrusion Detection in Wireless Ad Hoc Networks
-
February
-
Amitabh Mishra, Ketan Nadkarni, and Animesh Patcha, Virginia Tech 'Intrusion Detection in Wireless Ad Hoc Networks', IEEE Wireless Communications, February 2004, pp. 48-60.
-
(2004)
IEEE Wireless Communications
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
Tech, V.4
-
6
-
-
84952307800
-
Routing Anomaly Detection in Mobile Ad Hoc Networks
-
Dallas, TX, Oct
-
th IEEE Int'l Conf. on Computer Communications and Networks (ICCCN'03), Dallas, TX, Oct. 2003, pp. 25-31.
-
(2003)
th IEEE Int'l Conf. on Computer Communications and Networks (ICCCN'03)
, pp. 25-31
-
-
Sun, B.1
Wu, K.2
Pooch, U.3
-
8
-
-
4544258840
-
-
st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 135-147.
-
st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 135-147.
-
-
-
-
9
-
-
0034829265
-
Markov chains, classifiers, and intrusion detection
-
S. Jha, K. Tan, and R. Maxion, 'Markov chains, classifiers, and intrusion detection', Proceedings of 14th IEEE Computer Security Foundations Workshop, 2001, pp. 206-219
-
(2001)
Proceedings of 14th IEEE Computer Security Foundations Workshop
, pp. 206-219
-
-
Jha, S.1
Tan, K.2
Maxion, R.3
-
11
-
-
84890079004
-
-
Iaonna Stamouli, Patroklos G. rgyroudis, Hitesh Tewari, 'Real-time Intrusion Detection for Ad Hoc Networks', Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, 2005, pp. 374-380.
-
Iaonna Stamouli, Patroklos G. rgyroudis, Hitesh Tewari, 'Real-time Intrusion Detection for Ad Hoc Networks', Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, 2005, pp. 374-380.
-
-
-
-
13
-
-
33644854066
-
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
-
Daniel C.Nash, Thomas L. Martin, Dong S. Ha, and Michael S. Hsiao, 'Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices' IEEE Int'l Conf. on Pervasive Computing and Communications Workshops, 2005, pp. 141-145.
-
(2005)
IEEE Int'l Conf. on Pervasive Computing and Communications Workshops
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
14
-
-
2642584004
-
Denial of-Service Attacks on Battery-powered Mobile Computers
-
T.Martin, M.Hsiao, D.Ha, and J.Krishnaswami, 'Denial of-Service Attacks on Battery-powered Mobile Computers', Second IEEE International Conference on Pervasive Computing and Communications, March 2004, pp. 309-318.
-
(2004)
Second IEEE International Conference on Pervasive Computing and Communications, March
, pp. 309-318
-
-
Martin, T.1
Hsiao, M.2
Ha, D.3
Krishnaswami, J.4
|