-
1
-
-
33751017631
-
-
Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection - a review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, 3239. Springer, Heidelberg (2004)
-
Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection - a review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239. Springer, Heidelberg (2004)
-
-
-
-
2
-
-
26844541249
-
Anthocnet: An adaptive natureinspired algorithm for routing in mobile ad hoc networks
-
Di Caro, G., Ducatelle, F., Gambardella, L.M.: Anthocnet: An adaptive natureinspired algorithm for routing in mobile ad hoc networks. European Transactions on Telecommunications 16(2), 443-455 (2005)
-
(2005)
European Transactions on Telecommunications
, vol.16
, Issue.2
, pp. 443-455
-
-
Di Caro, G.1
Ducatelle, F.2
Gambardella, L.M.3
-
4
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11(1-2), 21-38 (2005)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Imielinski, Korth eds, Kluwer Academic Publishers, Dordrecht
-
Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds.) Mobile Computing, pp. 153-181. Kluwer Academic Publishers, Dordrecht (1996)
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
6
-
-
34548068359
-
-
Mazhar, N., Farooq, M.: Vulnerability analysis and security framework (beesec) for nature inspired manet routing protocols. In: Proceedings of GECCO-2007, London, UK, July 2007 (accepted to be published, 2007)
-
Mazhar, N., Farooq, M.: Vulnerability analysis and security framework (beesec) for nature inspired manet routing protocols. In: Proceedings of GECCO-2007, London, UK, July 2007 (accepted to be published, 2007)
-
-
-
-
7
-
-
34347349933
-
Ad-hoc on-demand distance vector routing
-
IEEE Computer Society Press, Los Alamitos
-
Perkins, C., Royer, E.: Ad-hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, February 1999, pp. 90-100. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, February
, pp. 90-100
-
-
Perkins, C.1
Royer, E.2
-
8
-
-
0842331560
-
Termite: Ad-hoc networking with stigmergy
-
San Francisco, USA, December, IEEE Computer Society Press, Los Alamitos
-
Roth, M., Wicker, S.: Termite: Ad-hoc networking with stigmergy. In: Proceedings of IEEE GLOBE-COM, San Francisco, USA, December 2003. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proceedings of IEEE GLOBE-COM
-
-
Roth, M.1
Wicker, S.2
-
9
-
-
26844569805
-
An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks
-
September
-
Sarafijanovic, S., Le Boudec, J.Y.: An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks. IEEE Transactions on Neural Networks 16(5) (September 2005)
-
(2005)
IEEE Transactions on Neural Networks
, vol.16
, Issue.5
-
-
Sarafijanovic, S.1
Le Boudec, J.Y.2
-
10
-
-
32444432940
-
-
Wedde, H.F., Farooq, M., Pannenbaecker, T., Vogel, B., Mueller, C., Meth, J., Jeruschkat, R.: Beeadhoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. In: GECCO, pp. 153-160 (2005)
-
Wedde, H.F., Farooq, M., Pannenbaecker, T., Vogel, B., Mueller, C., Meth, J., Jeruschkat, R.: Beeadhoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. In: GECCO, pp. 153-160 (2005)
-
-
-
-
11
-
-
77049105442
-
-
Wedde, H.F., Farooq, M., Zhang, Y.: Beehive: An efficient fault-tolerant routing algorithm inspired by honey bee behavior. In: Dorigo, M., Birattari, M., Blum, C., Gambardella, L.M., Mondada, F., Stützle, T. (eds.) ANTS 2004. LNCS, 3172, pp. 83-94. Springer, Heidelberg (2004)
-
Wedde, H.F., Farooq, M., Zhang, Y.: Beehive: An efficient fault-tolerant routing algorithm inspired by honey bee behavior. In: Dorigo, M., Birattari, M., Blum, C., Gambardella, L.M., Mondada, F., Stützle, T. (eds.) ANTS 2004. LNCS, vol. 3172, pp. 83-94. Springer, Heidelberg (2004)
-
-
-
-
12
-
-
33750241323
-
-
Wedde, H.F., Timm, C., Farooq, M.: Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems. In: PPSN, pp. 623-632 (2006)
-
Wedde, H.F., Timm, C., Farooq, M.: Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems. In: PPSN, pp. 623-632 (2006)
-
-
-
-
13
-
-
33745781835
-
Beehiveguard: A step towards secure nature inspired routing algorithms
-
Rothlauf, F, Branke, J, Cagnoni, S, Costa, E, Cotta, C, Drechsler, R, Lutton, E, Machado, P, Moore, J.H, Romero, J, Smith, G.D, Squillero, G, Takagi, H, eds, EvoWorkshops 2006, Springer, Heidelberg
-
Wedde, H.F., Timm, C., Farooq, M.: Beehiveguard: A step towards secure nature inspired routing algorithms. In: Rothlauf, F., Branke, J., Cagnoni, S., Costa, E., Cotta, C., Drechsler, R., Lutton, E., Machado, P., Moore, J.H., Romero, J., Smith, G.D., Squillero, G., Takagi, H. (eds.) EvoWorkshops 2006. LNCS, vol. 3907, pp. 243-254. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3907
, pp. 243-254
-
-
Wedde, H.F.1
Timm, C.2
Farooq, M.3
|