메뉴 건너뛰기




Volumn , Issue , 2003, Pages 135-147

A cooperative intrusion detection system for ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CONSTRAINT THEORY; LAPTOP COMPUTERS; MOBILE TELECOMMUNICATION SYSTEMS; PERSONAL DIGITAL ASSISTANTS; TELEPHONE; TOPOLOGY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 4544258840     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/986858.986877     Document Type: Conference Paper
Times cited : (385)

References (31)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James P. Anderson Company, Fort Washington, Pennsylvania, April
    • J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
    • (1980) Technical Report
    • Anderson, J.P.1
  • 7
    • 0013294745 scopus 로고    scopus 로고
    • Protecting routing infrastructures from denial of service using cooperative intrusion detection
    • S. Cheung and K. Levitt. Protecting routing infrastructures from denial of service using cooperative intrusion detection. In New Security Paradigms Workshop, 1997.
    • (1997) New Security Paradigms Workshop
    • Cheung, S.1    Levitt, K.2
  • 12
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • March
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 13
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Tomasz Imielinski and Hank Korth, editors, Kluwer Academic Publishers
    • D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. In Tomasz Imielinski and Hank Korth, editors, Mobile Computing, pages 153-181. Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 14
    • 0034266911 scopus 로고    scopus 로고
    • Location-aided routing (LAR) in mobile ad hoc networks
    • Extended version of the Mobicom'98 paper
    • Y.-B. Ko and N. H. Vaidya. Location-aided routing (LAR) in mobile ad hoc networks. ACM/Baltzer Wireless Networks (WINET) journal, Vol 6-4 Extended version of the Mobicom'98 paper., 2000.
    • (2000) ACM/Baltzer Wireless Networks (WINET) Journal , vol.6 , Issue.4
    • Ko, Y.-B.1    Vaidya, N.H.2
  • 16
    • 84905400212 scopus 로고    scopus 로고
    • Flexible, mobile agent based intrsuion detection for dynamic networks
    • C. Krugel and T. Toth. Flexible, mobile agent based intrsuion detection for dynamic networks. In European Wireless, 2002.
    • (2002) European Wireless
    • Krugel, C.1    Toth, T.2
  • 20
    • 0003582910 scopus 로고    scopus 로고
    • Ad hoc networking: An introduction
    • C. E. Perkins, editor, Addison-Wesley
    • C. E. Perkins. Ad hoc networking: An introduction. In C. E. Perkins, editor, Ad Hoc Networking. Addison-Wesley, 2000.
    • (2000) Ad Hoc Networking
    • Perkins, C.E.1
  • 22
    • 0004024262 scopus 로고    scopus 로고
    • The ad hoc on-demand distance-vector protocol
    • C. E. Perkins, editor, Addison-Wesley
    • C. E. Perkins and E. M. Royer. The ad hoc on-demand distance-vector protocol. In C. E. Perkins, editor, Ad Hoc Networking. Addison-Wesley, 2000.
    • (2000) Ad Hoc Networking
    • Perkins, C.E.1    Royer, E.M.2
  • 29
    • 4544221255 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector (SAODV) routing
    • draft-guerrero-manet-saodv-00.txt, August 2001 (Work in Progress), August
    • M. G. Zapata. Secure ad hoc on-demand distance vector (SAODV) routing. IETF Internet Draft, draft-guerrero-manet-saodv-00.txt, August 2001 (Work in Progress), August 2001.
    • (2001) IETF Internet Draft
    • Zapata, M.G.1
  • 31
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov/Dec
    • L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, Nov/Dec 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.