-
1
-
-
36348936531
-
-
Crossbow Technology Inc
-
Crossbow Technology Inc. www.xbow.com
-
-
-
-
3
-
-
4344609431
-
Danger theory: The link between ais and ids
-
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod. Danger theory: The link between ais and ids. Proc. International Conference on Artificial Immune Systems (ICARIS'03), 2003.
-
(2003)
Proc. International Conference on Artificial Immune Systems (ICARIS'03)
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
5
-
-
33747294522
-
Understanding Protocol Performance and Robustness of Ad Hoc Networks Through Structural Analysis
-
C. L. Barrett, M. Drozda, D. C. Engelhart, V. S. Anil Kumar, M. V. Marathe, M. M. Morin, S. S. Ravi, J. P. Smith, Understanding Protocol Performance and Robustness of Ad Hoc Networks Through Structural Analysis. Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2005), 2005.
-
(2005)
Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2005)
-
-
Barrett, C.L.1
Drozda, M.2
Engelhart, D.C.3
Anil Kumar, V.S.4
Marathe, M.V.5
Morin, M.M.6
Ravi, S.S.7
Smith, J.P.8
-
6
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
D'haeseleer, P., Forrest, S., and Helman, P. An immunological approach to change detection: Algorithms, analysis and implications. Proc. IEEE Symposium on Research in Security and Privacy, 1996.
-
(1996)
Proc. IEEE Symposium on Research in Security and Privacy
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
9
-
-
0000629443
-
Dynamic Source Routing in Ad Hoc Wireless Networks
-
Tomasz Imielinski and Hank Korth, Eds. Chapter 5, pp, Kluwer Academic Publishers
-
D. Johnson, D. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, Tomasz Imielinski and Hank Korth, Eds. Chapter 5, pp. 153-181, Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
10
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Zhang, Y. and Lee, W. and Huang, Y.A. Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks (WINET), vol. 9, no. 5, pp. 545-556, 2003.
-
(2003)
Wireless Networks (WINET)
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.A.3
-
14
-
-
0036986445
-
Survivable mobile wireless networks: Issues, challenges, and research directions
-
James P. G. Sterbenz, Rajesh Krishnan, Regina Rosales Hain, Alden W. Jackson, David Levin, Ram Ramanadian, John Zao. Survivable mobile wireless networks: issues, challenges, and research directions. Proc. ACM workshop on Wireless security, 2002.
-
(2002)
Proc. ACM workshop on Wireless security
-
-
Sterbenz, J.P.G.1
Krishnan, R.2
Rosales Hain, R.3
Jackson, A.W.4
Levin, D.5
Ramanadian, R.6
Zao, J.7
-
15
-
-
26844458123
-
An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors
-
Slaviša Sarafijanović, Jean-Yves Le Boudec. An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors. Proc. the 3rd International Conference on Artificial Immune Systems (ICARIS 2004), 2004.
-
(2004)
Proc. the 3rd International Conference on Artificial Immune Systems (ICARIS 2004)
-
-
Sarafijanović, S.1
Boudec, J.L.2
-
16
-
-
33745804827
-
An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-Hoc Networks
-
Jean-Yves Le Boudec, Slaviša Sarafijanović. An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-Hoc Networks. Proc. Bio-ADIT'04, 2004.
-
(2004)
Proc. Bio-ADIT'04
-
-
Boudec, J.L.1
Sarafijanović, S.2
|