-
1
-
-
0036473405
-
Verisim: Formal analysis of network simulations
-
+02]
-
+02] K. Bhargavan, C. A. Gunter, M. Kim, I. Lee, D. Obradovic, O. Sokolsky, and M. Viswanathan. Verisim: Formal analysis of network simulations. IEEE Transactions on Software Engineering, 2002.
-
(2002)
IEEE Transactions on Software Engineering
-
-
Bhargavan, K.1
Gunter, C.A.2
Kim, M.3
Lee, I.4
Obradovic, D.5
Sokolsky, O.6
Viswanathan, M.7
-
4
-
-
0003597249
-
Wormhole detection in wireless ad hoc networks
-
[HPJ01] Department of Computer Science, Rice University, December
-
[HPJ01] Y.-C. Hu, A. Perrig, and D. B. Johnson. Wormhole detection in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science, Rice University, December 2001.
-
(2001)
Technical Report
, vol.TR01-384
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
[IKP95]
-
[IKP95] K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. Software Engineering, 21(3):181-199, 1995.
-
(1995)
Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
7
-
-
0001341422
-
DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks
-
[JMB01] C. E. Perkins, editor, chapter 5, Addison-Wesley
-
[JMB01] D. B. Johnson, D. A. Maltz, and J. Broch. DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. In C. E. Perkins, editor, Ad Hoc Networking, chapter 5, pages 139-172. Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
8
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
[KRL97]
-
[KRL97] C. Ko, M. Ruschitzka, and K. N. Levitt. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 134-144, 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 134-144
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.N.3
-
9
-
-
85011266250
-
System services for ad-hoc routing: Architecture, implementation and experiences
-
[KZG03] San Francisco, CA, May
-
[KZG03] V. Kawadia, Y. Zhang, and B. Gupta. System services for ad-hoc routing: Architecture, implementation and experiences. In First International Conference on Mobile Systems, Applications, and Services (MobiSys'03), San Francisco, CA, May 2003.
-
(2003)
First International Conference on Mobile Systems, Applications, and Services (MobiSys'03)
-
-
Kawadia, V.1
Zhang, Y.2
Gupta, B.3
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
[MGLB00]
-
[MGLB00] S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
13
-
-
84903836776
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
[NS03] June
-
[NS03] P. Ning and K. Sun. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, June 2003.
-
(2003)
Proceedings of the 4th Annual IEEE Information Assurance Workshop
, pp. 60-67
-
-
Ning, P.1
Sun, K.2
-
15
-
-
0035249889
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
[PRDM01] February
-
[PRDM01] C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina. Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE Personal Communications Magazine special issue on Ad hoc Networking, pages 16-28, February 2001.
-
(2001)
IEEE Personal Communications Magazine Special Issue on Ad Hoc Networking
, pp. 16-28
-
-
Perkins, C.E.1
Royer, E.M.2
Das, S.R.3
Marina, M.K.4
-
16
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
+02]
-
+02] R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou. Specification-based anomaly detection: A new approach for detecting network intrusions. In Proceedings of the ACM Computer and Communication Security Conference (CCS'02), 2002.
-
(2002)
Proceedings of the ACM Computer and Communication Security Conference (CCS'02)
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
17
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
+03] George W. Johnson Center at George Mason University, Fairfax, VA, October
-
+03] C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. N. Levitt. A specification-based intrusion detection system for AODV. In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), George W. Johnson Center at George Mason University, Fairfax, VA, October 2003.
-
(2003)
ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.N.6
-
19
-
-
0003456435
-
Secure ad hoc on-demand distance vector (SAODV) routing
-
[Zap01] Internet Engineering Task Force, August expired
-
[Zap01] M. G. Zapata. Secure ad hoc on-demand distance vector (SAODV) routing. Internet draft draft-guerrero-manet-saodv-00.txt, Internet Engineering Task Force, August 2001. expired 2002.
-
(2001)
Internet Draft Draft-guerrero-manet-saodv-00.txt
, pp. 2002
-
-
Zapata, M.G.1
|