-
1
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM 2000, pages 255-265, 2000.
-
(2000)
Proceedings of MOBICOM 2000
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
2
-
-
15344340908
-
A Robust Reputation System for Mobile ad hoc Networks
-
EPFL-DI-ICA, Lausanne, Switzerland, July
-
S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Mobile ad hoc Networks. Technical Report, IC/2003/50, EPFL-DI-ICA, Lausanne, Switzerland, July 2003.
-
(2003)
Technical Report, IC/2003/50
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
3
-
-
2442597363
-
Performance Analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in Distributed Ad-Hoc Networks
-
Lausanne, CH, June
-
S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness In Distributed Ad-Hoc Networks. In Proceedings of MobiHOC, IEEE/ACM, Lausanne, CH, June 2002.
-
(2002)
Proceedings of MobiHOC, IEEE/ACM
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
6
-
-
0002467033
-
Architecture for an Artificial Immune System
-
S. A Hofmeyr and S. Forrest "Architecture for an Artificial Immune System". Evolutionary Computation 7(1):45-68. 2000.
-
(2000)
Evolutionary Computation
, vol.7
, Issue.1
, pp. 45-68
-
-
Hofmeyr, S.A.1
Forrest, S.2
-
8
-
-
0038458266
-
Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection
-
San Francisko, July 7-11
-
J. Kim and P.J. Bentley. Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection: Genetic and Evolutionary Computation Conference 2001 (GECCO-2001), San Francisko, pp. 1330-1337, July 7-11.
-
Genetic and Evolutionary Computation Conference 2001 (GECCO-2001)
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.J.2
-
9
-
-
0034870039
-
The Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with Negative Selection Operator
-
Seoul, Korea, May 27-30
-
J. Kim and P.J. Bentley. The Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with Negative Selection Operator. The Congres on Evolutionary Computation (CEC-2001), Seoul, Korea, pp. 1244-1252, May 27-30.
-
The Congres on Evolutionary Computation (CEC-2001)
, pp. 1244-1252
-
-
Kim, J.1
Bentley, P.J.2
-
10
-
-
84901408225
-
Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection
-
Honolulu, May 12-17
-
J. Kim and P.J. Bentley. Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection. The Congress on Evolutionary Computation (CEC-2002), Honolulu, pp.1015-1020, May 12-17, 2002
-
(2002)
The Congress on Evolutionary Computation (CEC-2002)
, pp. 1015-1020
-
-
Kim, J.1
Bentley, P.J.2
-
11
-
-
0028201732
-
Tolerance, Danger and the Extended Family
-
P. Matzinger. Tolerance, Danger and the Extended Family. Annual Review of Immunology, 12:991-1045, 1994.
-
(1994)
Annual Review of Immunology
, vol.12
, pp. 991-1045
-
-
Matzinger, P.1
-
14
-
-
0141991983
-
Order from disorder sprung: Recognition and regulation in the immune system
-
May
-
Tak W. Mak. Order from disorder sprung: recognition and regulation in the immune system. in Phil. Trans. R. Soc. Lond. A (2003) 361, 1235-1250, May 2003.
-
(2003)
Phil. Trans. R. Soc. Lond. A (2003)
, vol.361
, pp. 1235-1250
-
-
Mak, T.W.1
-
15
-
-
0031652485
-
Glomosim: A library for parallel simulation of large scale wireless networks
-
May 26-29, in Banff, Alberta, Canada
-
Xiang Zeng, Rajive Bagrodia, and Mario Gerla. Glomosim: A library for parallel simulation of large scale wireless networks. Proceedings of the 12th workshop on Parallel and Distributed Simulations-PDAS'98, May 26-29, in Banff, Alberta, Canada, 1998.
-
(1998)
Proceedings of the 12th Workshop on Parallel and Distributed Simulations-PDAS'98
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
17
-
-
0141539299
-
Analysis of Link Failures in an IP Backbone
-
ACM Press. Marseille, France. November
-
G. Iannaccone C.-N. Chuah, R. Mortier, S. Bhattacharyya, C. Diot. Analysis of Link Failures in an IP Backbone. Proceeding of IMW 2002. ACM Press. Marseille, France. November 2002
-
(2002)
Proceeding of IMW 2002
-
-
Iannaccone, G.1
Chuah, C.-N.2
Mortier, R.3
Bhattacharyya, S.4
Diot, C.5
-
20
-
-
0036613083
-
An Immunity-Based Technique to Characterize Intrusions in Computer Networks
-
June
-
Dipankar Dasgupta and Fabio Gonzalez, An Immunity-Based Technique to Characterize Intrusions in Computer Networks, IEEE Trans. Evol. Comput., (6)9, pp. 1081-1088, June 2002
-
(2002)
IEEE Trans. Evol. Comput.
, vol.9
, Issue.6
, pp. 1081-1088
-
-
Dasgupta, D.1
Gonzalez, F.2
|