-
1
-
-
0003247337
-
Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation consideration
-
(informational), IETF
-
S. Corson and J. Marker - Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation consideration. RFC 2501 (informational), IETF, 1999.
-
(1999)
RFC
, vol.2501
-
-
Corson, S.1
Marker, J.2
-
3
-
-
0033357103
-
Securing ad hoc networks
-
Nov.-Dec. 1999.
-
L. Zhou and Z. J. Haas - Securing ad hoc networks. IEEE Network, Vol. 13, Nov.-Dec. 1999. pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
4
-
-
84883869163
-
Self-securing Ad HocWireless Networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang - Self-securing Ad HocWireless Networks, Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02), 2002.
-
(2002)
Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
5
-
-
35248840481
-
-
Reference anonymized for the review process
-
Reference anonymized for the review process.
-
-
-
-
6
-
-
35248888006
-
Weighted communication in a security compound
-
Yugoslavia, Sept.
-
T. Droste - Weighted communication in a security compound,. Proceedings of the 5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service, 2001 (TELSIKS 2001), pp. 463-466, vol.2, Yugoslavia, Sept. 2001.
-
(2001)
Proceedings of the 5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service, 2001 (TELSIKS 2001)
, vol.2
, pp. 463-466
-
-
Droste, T.1
-
8
-
-
35248841940
-
-
Reference anonymized for the review process
-
Reference anonymized for the review process.
-
-
-
-
9
-
-
1542622848
-
Intrusion detection message exchange requirements
-
June
-
Wood and Erlinger, "Intrusion detection message exchange requirements". IETF Internet draft. June 2002.
-
(2002)
IETF Internet Draft
-
-
Wood1
Erlinger2
-
10
-
-
0004225165
-
Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML)
-
June
-
D. Curry, H. Debar, and Merrill Lynch - Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML). IETF Internet draft. June 2002.
-
(2002)
IETF Internet Draft
-
-
Curry, D.1
Debar, H.2
Lynch, M.3
-
12
-
-
35248849282
-
AAFID - Autonomous Agents for Intrusion Detection
-
COAST Laboratory Purdue University, June
-
J. Balasubraniyan, J. Fernandez, D. Isacoff, E. Spafford, D. Zamboni - AAFID - Autonomous Agents For Intrusion Detection, Technical report 98/05, COAST Laboratory Purdue University, June 1998.
-
(1998)
Technical Report 98/05
-
-
Balasubraniyan, J.1
Fernandez, J.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
13
-
-
35248840976
-
-
Computer Security Laboratory, Department of Computer Science, University of California, Davis, June
-
Steven R. Snapp, James Brentano, Gihan V. Dias, Terrance L. Goan, L. Todd Heberlein, Che-Lin Ho, Karl N. Levitt, Biswanath Mukkherjee, Stephen E. Smaha, Tim Grance, Daniel M. Teal, and Doug Mansur - DIDS-Distributed Intrusion Detection System, Computer Security Laboratory, Department of Computer Science, University of California, Davis, June 1992.
-
(1992)
DIDS-Distributed Intrusion Detection System
-
-
Snapp, S.R.1
Brentano, J.2
Dias, G.V.3
Goan, T.L.4
Todd Heberlein, L.5
Ho, C.-L.6
Levitt, K.N.7
Mukkherjee, B.8
Smaha, S.E.9
Grance, T.10
Teal, D.M.11
Mansur, D.12
-
15
-
-
0000949239
-
-
Computer Security Laboratory, Department of Computer Science, University of California, Davis
-
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle - GrIDS- A Graph Based Intrusion Detection System for Large Networks, Computer Security Laboratory, Department of Computer Science, University of California, Davis, 1996.
-
(1996)
GrIDS- A Graph Based Intrusion Detection System for Large Networks
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
16
-
-
0029756282
-
CSM - Cooperating Security Managers: A peer based intrusion detection system
-
January/February
-
Gregory B White, Eric A. Fish and Udo Pooch - CSM - Cooperating Security Managers : a peer based intrusion detection system, IEEE Networks, pages 20-23, January/February 1996.
-
(1996)
IEEE Networks
, pp. 20-23
-
-
White, G.B.1
Fish, E.A.2
Pooch, U.3
-
17
-
-
35248900343
-
-
Advanced Networking Research, MCNC Computer Science Dept, NC State University, February
-
Y. F Fou, F. Gong, C. Sargor, X. Wu, S. F. Wu, H. C. Chang, F. Wang - JINAO-Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol, Advanced Networking Research, MCNC Computer Science Dept, NC State University, February, 1999.
-
(1999)
JINAO-Design and Implementation of A Scalable Intrusion Detection System for the OSPF Routing Protocol
-
-
Fou, Y.F.1
Gong, F.2
Sargor, C.3
Wu, X.4
Wu, S.F.5
Chang, H.C.6
Wang, F.7
-
22
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables - A feasibility study
-
Seattle, WA, USA, may
-
J. Cabrera, L. Lewis, R. Prasanth, X. Qin, W. Lee, and R. Mehra - Proactive detection of distributed denial of service attacks using MIB traffic variables - a feasibility study, in Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management, Seattle, WA, USA, may 2001.
-
(2001)
Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management
-
-
Cabrera, J.1
Lewis, L.2
Prasanth, R.3
Qin, X.4
Lee, W.5
Mehra, R.6
-
24
-
-
0008968465
-
A mobile agent approach to intrusion detection
-
Joint Research Centre Institute for Systems, Informatics and Safety, Italy, June
-
S. Martino - A mobile agent approach to intrusion detection, technical report, Joint Research Centre Institute for Systems, Informatics and Safety, Italy, June 1999.
-
(1999)
Technical Report
-
-
Martino, S.1
-
26
-
-
35248862957
-
-
Reference anonymized for the review process
-
Reference anonymized for the review process.
-
-
-
-
27
-
-
10844277649
-
A Revised Taxonomy for Intrusion-Detection Systems
-
Zurich
-
H. Debar, M. Dacier and A. Wespi - A Revised Taxonomy for Intrusion-Detection Systems, IBM Research Report, Zurich, 1999.
-
(1999)
IBM Research Report
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
29
-
-
4143105612
-
Optimized Link State Routing Protocol
-
July
-
T. Clausen, P. Jacquet, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, L. Viennot - Optimized Link State Routing Protocol - IETF draft, MANET working group, version 7, July 2002.
-
(2002)
IETF Draft, MANET Working Group, Version 7
-
-
Clausen, T.1
Jacquet, P.2
Laouiti, A.3
Minet, P.4
Muhlethaler, P.5
Qayyum, A.6
Viennot, L.7
-
30
-
-
35248869204
-
-
http://edge.mcs.drexel.edu/GICL/people/sevy/snmp/snmp_ package.html.
-
-
-
-
31
-
-
0031188330
-
Special Feature: A Hands-On Look at Java Mobile Agents
-
J. Kiniry and D. Zimmerman - Special Feature: A Hands-On Look at Java Mobile Agents, IEEE Internet Computing, Vol. 1, No. 4, July/August 1997.
-
(1997)
IEEE Internet Computing
, vol.1
, Issue.4 JULY-AUGUST
-
-
Kiniry, J.1
Zimmerman, D.2
-
32
-
-
35248888946
-
-
http://www.netsnmp.org.
-
-
-
-
33
-
-
35248858308
-
-
http://www.tcpdump.org.
-
-
-
-
34
-
-
0006185927
-
Internetworking with TCP/IP
-
Linux/Posix Sockets Version LINUX/POSI, Prentice-Hall
-
D. Comer; and D. L. - Internetworking with TCP/IP, Vol. 3: Client-Server Programming and Applications, Linux/Posix Sockets Version LINUX/POSI, Prentice-Hall, 2000.
-
(2000)
Client-Server Programming and Applications
, vol.3
-
-
Comer, D.1
|