-
1
-
-
84903836776
-
How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad-hoc Routing Protocols
-
West Point, June
-
P. Ning and K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad-hoc Routing Protocols," In Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003.
-
(2003)
Proceedings of the 4th Annual IEEE Information Assurance Workshop
, pp. 60-67
-
-
Ning, P.1
Sun, K.2
-
2
-
-
0041973497
-
Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
-
IEEE, San Francisco, CA, April
-
Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks," In Proceedings IEEE INFOCOMM, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 3, pages 1976-1986, IEEE, San Francisco, CA, April 2003.
-
(2003)
Proceedings IEEE INFOCOMM, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
3
-
-
1542317831
-
-
Y. C. Hu, A. Perrig, and D. B. Johnson, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, In Proceedings of the ACM Workshop on Wireless Security (WiSe), pages 30-40, ACM, San Diego, CA, September 2003.
-
Y. C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," In Proceedings of the ACM Workshop on Wireless Security (WiSe), pages 30-40, ACM, San Diego, CA, September 2003.
-
-
-
-
4
-
-
0037629724
-
Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies
-
ICDCS, May
-
Y. A. Huang, W. Fan, W. K. Lee and P. S. Yu, "Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies," In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), May 2003.
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems
-
-
Huang, Y.A.1
Fan, W.2
Lee, W.K.3
Yu, P.S.4
-
5
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
September
-
Y. G. Zhang, W. K. Lee and Y. A. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.
-
(2003)
ACM/Kluwer Wireless Networks Journal (ACM WINET)
, vol.9
, Issue.5
-
-
Zhang, Y.G.1
Lee, W.K.2
Huang, Y.A.3
-
6
-
-
0012981871
-
Generalized k-harmonic Means - Boosting in Unsupervised Learning,
-
Technical Report HPL-2000-137, Hewlett-Packard Labs
-
B. Zhang, "Generalized k-harmonic Means - Boosting in Unsupervised Learning," Technical Report HPL-2000-137, Hewlett-Packard Labs, 2000.
-
(2000)
-
-
Zhang, B.1
-
7
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
MobiCom, Boston, August
-
S. Marti. T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks." In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom), Boston, August 2000.
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
8
-
-
0037885580
-
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad-hoc Networks
-
Canary Islands, Spain, January
-
S. Buchegger and J. Y. Le Boudec. "Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad-hoc Networks," 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, pages 403-410, January 2002.
-
(2002)
10th Euromicro Workshop on Parallel, Distributed and Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.Y.2
-
9
-
-
4544342574
-
A Specification-based Intrusion Detection System for AODV
-
SASN, Fairfax, Virginia
-
C. Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A Specification-based Intrusion Detection System for AODV," In Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pages 125-134, Fairfax, Virginia, 2003.
-
(2003)
Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 125-134
-
-
Tseng, C.Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
|