-
4
-
-
33750370441
-
-
Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model For MANET. In: Zamboni, D., Kruegel, C (eds.) RAID 2006. LNCS, 4219, Springer, Heidelberg (2006)
-
Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model For MANET. In: Zamboni, D., Kruegel, C (eds.) RAID 2006. LNCS, vol. 4219, Springer, Heidelberg (2006)
-
-
-
-
5
-
-
33745657261
-
-
Tseng, CH., Song, T., Balasubramanyam, P., Ko, C., Levitt, K.: A Specification-based Intrusion Detection Model for OLSR. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, Springer, Heidelberg (2006)
-
Tseng, CH., Song, T., Balasubramanyam, P., Ko, C., Levitt, K.: A Specification-based Intrusion Detection Model for OLSR. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, Springer, Heidelberg (2006)
-
-
-
-
6
-
-
4544342574
-
A Specification-Based Intrusion Detection System For AODV
-
Tseng, C., Balasubramanyam, P., Ko, C., Limprasittipom, R., Rowe, J., Levitt, K.: A Specification-Based Intrusion Detection System For AODV. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03) (October 2003)
-
(2003)
Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03) (October
-
-
Tseng, C.1
Balasubramanyam, P.2
Ko, C.3
Limprasittipom, R.4
Rowe, J.5
Levitt, K.6
-
7
-
-
84903836776
-
How to Misuse AODV: A Case Study of Insider Attacks against Mobile Adhoc Routing Protocols
-
West Point, June, IEEE Computer Society Press, Los Alamitos
-
Ning, P., Sun, K.: How to Misuse AODV: A Case Study of Insider Attacks against Mobile Adhoc Routing Protocols. In: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, June 2003, pp. 60-67. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proceedings of the 4th Annual IEEE Information Assurance Workshop
, pp. 60-67
-
-
Ning, P.1
Sun, K.2
-
8
-
-
0242696192
-
Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks)
-
Lausanne, Switzerland, June, ACM Press, New York
-
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, Lausanne, Switzerland, June 2002, ACM Press, New York (2002)
-
(2002)
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
10
-
-
4544258840
-
A cooperative intrusion detection system for ad hoc networks
-
ACM Press, New York
-
Huang, Y.-a., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October 2003, ACM Press, New York (2003)
-
(2003)
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October
-
-
Huang, Y.-A.1
Lee, W.2
-
11
-
-
84941158976
-
A general automatic response model for MANET
-
IEEE Computer Society Press, Los Alamitos
-
Wang, S.-H., Tseng, C.H., Ko, C., Gertz, M., Levitt, K.: A general automatic response model for MANET. In: Proceeding of First IEEE International Workshop on Next Generation Wireless Networks, December 2005, IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proceeding of First IEEE International Workshop on Next Generation Wireless Networks, December
-
-
Wang, S.-H.1
Tseng, C.H.2
Ko, C.3
Gertz, M.4
Levitt, K.5
-
12
-
-
34748875337
-
DRETA: Distributed Routing Evidence Tracing and Authentication intrusion detection Model for MANET
-
Tseng, C.H., Wang, S.-H., Levitt, K.: DRETA: Distributed Routing Evidence Tracing and Authentication intrusion detection Model for MANET. In: ASIACCS 2007 (2007)
-
(2007)
ASIACCS
-
-
Tseng, C.H.1
Wang, S.-H.2
Levitt, K.3
-
13
-
-
33750344908
-
Security-aware routing protocol for wireless ad hoc networks
-
October
-
Yi, S., Naldurg, P., Kravets, R.: Security-aware routing protocol for wireless ad hoc networks. In: Proceeding of ACM MobiHoc 2001 (October 2001)
-
(2001)
Proceeding of ACM MobiHoc
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
14
-
-
0033357103
-
Securing ad hoc networks
-
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24-30 (1999)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
15
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
IEEE Computer Society Press, Los Alamitos
-
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceeding of the Tenth IEEE International Conference on Network Protocols, IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Proceeding of the Tenth IEEE International Conference on Network Protocols
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
16
-
-
35248836533
-
-
Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using Specification-Based Intrusion Detection for Automated Response. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, Springer, Heidelberg (2003)
-
Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using Specification-Based Intrusion Detection for Automated Response. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, Springer, Heidelberg (2003)
-
-
-
-
17
-
-
35248877616
-
-
Tylutki, M., Levitt, K.N.: Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. In: Vigna, C., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, Springer, Heidelberg (2003)
-
Tylutki, M., Levitt, K.N.: Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. In: Vigna, C., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, Springer, Heidelberg (2003)
-
-
-
-
18
-
-
84948979531
-
Evaluating the impact of automated intrusion response mechanisms
-
Las Vegas, Nevada December 9-13
-
Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: 18th Annual Computer Security Applications Conference, Las Vegas, Nevada (December 9-13, 2002)
-
(2002)
18th Annual Computer Security Applications Conference
-
-
Toth, T.1
Kruegel, C.2
-
19
-
-
38149003407
-
-
Prasant, M., Srikanth, K. (eds,): Ad Hoc Networks: Technologies and Protocols (2004)
-
Prasant, M., Srikanth, K. (eds,): Ad Hoc Networks: Technologies and Protocols (2004)
-
-
-
-
20
-
-
0036957315
-
A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
ACM Press, New York
-
Hu, Y.-C., Perrig, A., Johnson, D.B.: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: The 8th ACM International Conference on Mobile Computing and Networking, September 2002, ACM Press, New York (2002)
-
(2002)
The 8th ACM International Conference on Mobile Computing and Networking, September
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
21
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Canetti, P.R., Tygar, D., Song, D.: The TESLA broadcast authentication protocol. Cryptobytes (RSA Laboratories, Summer/Fall 2002) 5(2), 2-13 (2002)
-
(2002)
Cryptobytes (RSA Laboratories, Summer/Fall 2002) 5
, pp. 2-13
-
-
Canetti, P.R.1
Tygar, D.2
Song, D.3
-
22
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
White, G., Fisch, E., Pooch, U.: Cooperating security managers: A peer-based intrusion detection system. IEEE Network 10, 20-23 (1996)
-
(1996)
IEEE Network
, vol.10
, pp. 20-23
-
-
White, G.1
Fisch, E.2
Pooch, U.3
-
24
-
-
84948979531
-
Evaluating the impact of automated intrusion response mechanisms
-
Las Vegas, Nevada December 9-13
-
Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: 18th Annual Computer Security Applications Conference, Las Vegas, Nevada (December 9-13, 2002)
-
(2002)
18th Annual Computer Security Applications Conference
-
-
Toth, T.1
Kruegel, C.2
-
25
-
-
38148999898
-
-
Nuevo, J.: A Comprehensible GloMoSim Tutorial (March 2004)
-
Nuevo, J.: A Comprehensible GloMoSim Tutorial (March 2004)
-
-
-
-
26
-
-
38149055364
-
-
He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks (2004)
-
He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks (2004)
-
-
-
-
27
-
-
38149039811
-
-
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks. In: Proceedings of MobiHoc 2002, Lausanne (June 2002)
-
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks. In: Proceedings of MobiHoc 2002, Lausanne (June 2002)
-
-
-
-
28
-
-
24744432675
-
Self-Policing Mobile Ad Hoc Networks by Reputation Systems
-
Buchegger, S., Le Boudee, J.-Y.: Self-Policing Mobile Ad Hoc Networks by Reputation Systems. IEEE Communications Magazine 43(7), 101-107 (2005)
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudee, J.-Y.2
-
29
-
-
33144465932
-
Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks
-
Lindsay, S.Y., Wei, Y., Zhu, H., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 24(2), 305-317 (2006)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 305-317
-
-
Lindsay, S.Y.1
Wei, Y.2
Zhu, H.3
Liu, K.J.R.4
|