메뉴 건너뛰기




Volumn 3141, Issue , 2004, Pages 396-411

An artificial immune system approach to misbehavior detection in mobile Ad Hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; CHEMICAL DETECTION; IMMUNE SYSTEM; NETWORK ROUTING; TELECOMMUNICATION NETWORKS;

EID: 35048820591     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27835-1_29     Document Type: Article
Times cited : (15)

References (20)
  • 1
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM 2000, pages 255-265, 2000.
    • (2000) Proceedings of MOBICOM 2000 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 2
    • 15344340908 scopus 로고    scopus 로고
    • A Robust Reputation System for Mobile ad hoc Networks
    • EPFL-DI-ICA, Lausanne, Switzerland, July
    • S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Mobile ad hoc Networks. Technical Report, IC/2003/50, EPFL-DI-ICA, Lausanne, Switzerland, July 2003.
    • (2003) Technical Report, IC/2003/50
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 3
    • 2442597363 scopus 로고    scopus 로고
    • Performance Analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in Distributed Ad-Hoc Networks
    • Lausanne, CH, June
    • S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness In Distributed Ad-Hoc Networks. In Proceedings of MobiHOC, IEEE/ACM, Lausanne, CH, June 2002.
    • (2002) Proceedings of MobiHOC, IEEE/ACM
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 6
    • 0002467033 scopus 로고    scopus 로고
    • Architecture for an Artificial Immune System
    • S. A Hofmeyr and S. Forrest "Architecture for an Artificial Immune System". Evolutionary Computation 7(1):45-68. 2000.
    • (2000) Evolutionary Computation , vol.7 , Issue.1 , pp. 45-68
    • Hofmeyr, S.A.1    Forrest, S.2
  • 8
    • 0038458266 scopus 로고    scopus 로고
    • Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection
    • San Francisko, July 7-11
    • J. Kim and P.J. Bentley. Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection: Genetic and Evolutionary Computation Conference 2001 (GECCO-2001), San Francisko, pp. 1330-1337, July 7-11.
    • Genetic and Evolutionary Computation Conference 2001 (GECCO-2001) , pp. 1330-1337
    • Kim, J.1    Bentley, P.J.2
  • 9
    • 0034870039 scopus 로고    scopus 로고
    • The Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with Negative Selection Operator
    • Seoul, Korea, May 27-30
    • J. Kim and P.J. Bentley. The Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with Negative Selection Operator. The Congres on Evolutionary Computation (CEC-2001), Seoul, Korea, pp. 1244-1252, May 27-30.
    • The Congres on Evolutionary Computation (CEC-2001) , pp. 1244-1252
    • Kim, J.1    Bentley, P.J.2
  • 10
    • 84901408225 scopus 로고    scopus 로고
    • Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection
    • Honolulu, May 12-17
    • J. Kim and P.J. Bentley. Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection. The Congress on Evolutionary Computation (CEC-2002), Honolulu, pp.1015-1020, May 12-17, 2002
    • (2002) The Congress on Evolutionary Computation (CEC-2002) , pp. 1015-1020
    • Kim, J.1    Bentley, P.J.2
  • 11
    • 0028201732 scopus 로고
    • Tolerance, Danger and the Extended Family
    • P. Matzinger. Tolerance, Danger and the Extended Family. Annual Review of Immunology, 12:991-1045, 1994.
    • (1994) Annual Review of Immunology , vol.12 , pp. 991-1045
    • Matzinger, P.1
  • 14
    • 0141991983 scopus 로고    scopus 로고
    • Order from disorder sprung: Recognition and regulation in the immune system
    • May
    • Tak W. Mak. Order from disorder sprung: recognition and regulation in the immune system. in Phil. Trans. R. Soc. Lond. A (2003) 361, 1235-1250, May 2003.
    • (2003) Phil. Trans. R. Soc. Lond. A (2003) , vol.361 , pp. 1235-1250
    • Mak, T.W.1
  • 20
    • 0036613083 scopus 로고    scopus 로고
    • An Immunity-Based Technique to Characterize Intrusions in Computer Networks
    • June
    • Dipankar Dasgupta and Fabio Gonzalez, An Immunity-Based Technique to Characterize Intrusions in Computer Networks, IEEE Trans. Evol. Comput., (6)9, pp. 1081-1088, June 2002
    • (2002) IEEE Trans. Evol. Comput. , vol.9 , Issue.6 , pp. 1081-1088
    • Dasgupta, D.1    Gonzalez, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.