-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P. Anderson Company, Fort Washington, Pennsylvania, April
-
J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
2
-
-
0033366376
-
Distributed clustering for ad hoc networks
-
Perth, Western Australia, June
-
S. Basagni. Distributed clustering for ad hoc networks. In ISPAN-99, International Symposium on Parallel Architectures, Algorithms, and Networks, pages 310-315, Perth, Western Australia, June 1999.
-
(1999)
ISPAN-99, International Symposium on Parallel Architectures, Algorithms, and Networks
, pp. 310-315
-
-
Basagni, S.1
-
3
-
-
0035789267
-
Secure pebblenets
-
Long Beach, CA, October
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, October 2001.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001)
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
7
-
-
0013294745
-
Protecting routing infrastructures from denial of service using cooperative intrusion detection
-
S. Cheung and K. Levitt. Protecting routing infrastructures from denial of service using cooperative intrusion detection. In New Security Paradigms Workshop, 1997.
-
(1997)
New Security Paradigms Workshop
-
-
Cheung, S.1
Levitt, K.2
-
11
-
-
0037629724
-
Cross-feature analysis for detecting ad-hoc routing anomalies
-
Providence, RI, May
-
Y. Huang, W. Fan, W. Lee, and P. Yu. Cross-feature analysis for detecting ad-hoc routing anomalies. In Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, RI, May 2003.
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.4
-
12
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
13
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Tomasz Imielinski and Hank Korth, editors, Kluwer Academic Publishers
-
D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. In Tomasz Imielinski and Hank Korth, editors, Mobile Computing, pages 153-181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
14
-
-
0034266911
-
Location-aided routing (LAR) in mobile ad hoc networks
-
Extended version of the Mobicom'98 paper
-
Y.-B. Ko and N. H. Vaidya. Location-aided routing (LAR) in mobile ad hoc networks. ACM/Baltzer Wireless Networks (WINET) journal, Vol 6-4 Extended version of the Mobicom'98 paper., 2000.
-
(2000)
ACM/Baltzer Wireless Networks (WINET) Journal
, vol.6
, Issue.4
-
-
Ko, Y.-B.1
Vaidya, N.H.2
-
15
-
-
0031126049
-
A cluster-based approach for routing in dynamic networks
-
P. Krishna, N. H. Vaidya, M. Chatterjee, and D. K. Pradhan. A cluster-based approach for routing in dynamic networks. ACM SIGCOMM Computer Communication Review, 27(2):49-64, 1997.
-
(1997)
ACM SIGCOMM Computer Communication Review
, vol.27
, Issue.2
, pp. 49-64
-
-
Krishna, P.1
Vaidya, N.H.2
Chatterjee, M.3
Pradhan, D.K.4
-
16
-
-
84905400212
-
Flexible, mobile agent based intrsuion detection for dynamic networks
-
C. Krugel and T. Toth. Flexible, mobile agent based intrsuion detection for dynamic networks. In European Wireless, 2002.
-
(2002)
European Wireless
-
-
Krugel, C.1
Toth, T.2
-
18
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
19
-
-
0038349213
-
Sensor-based intrusion detection for intra-domain distance-vector routing
-
R. Sandhu, editor, Washington, DC, November ACM Press
-
V. Mittal and G. Vigna. Sensor-based intrusion detection for intra-domain distance-vector routing. In R. Sandhu, editor, Proceedings of the ACM Conference on Computer and Communication Security (CCS'02), Washington, DC, November 2002. ACM Press.
-
(2002)
Proceedings of the ACM Conference on Computer and Communication Security (CCS'02)
-
-
Mittal, V.1
Vigna, G.2
-
20
-
-
0003582910
-
Ad hoc networking: An introduction
-
C. E. Perkins, editor, Addison-Wesley
-
C. E. Perkins. Ad hoc networking: An introduction. In C. E. Perkins, editor, Ad Hoc Networking. Addison-Wesley, 2000.
-
(2000)
Ad Hoc Networking
-
-
Perkins, C.E.1
-
22
-
-
0004024262
-
The ad hoc on-demand distance-vector protocol
-
C. E. Perkins, editor, Addison-Wesley
-
C. E. Perkins and E. M. Royer. The ad hoc on-demand distance-vector protocol. In C. E. Perkins, editor, Ad Hoc Networking. Addison-Wesley, 2000.
-
(2000)
Ad Hoc Networking
-
-
Perkins, C.E.1
Royer, E.M.2
-
23
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA broadcast authentication protocol. Cryptobytes (RSA Laboratories, Summer/Fall 2002), 5(2):2-13, 2002.
-
(2002)
Cryptobytes (RSA Laboratories, Summer/Fall 2002)
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
24
-
-
0032310679
-
Statistical anomaly detection for link-state routing protocols
-
Austin, TX, October
-
D. Qu, B. M. Vetter, F. Wang, R. Narayan, S. F. Wu, Y. F. Jou, F. Gong, and C. Sargor. Statistical anomaly detection for link-state routing protocols. In Proceedings of 1998 International Conference on Network Protocols, Austin, TX, October 1998.
-
(1998)
Proceedings of 1998 International Conference on Network Protocols
-
-
Qu, D.1
Vetter, B.M.2
Wang, F.3
Narayan, R.4
Wu, S.F.5
Jou, Y.F.6
Gong, F.7
Sargor, C.8
-
27
-
-
0030695529
-
Securing distance-vector routing protocols
-
San Diego, California, February
-
B. R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, pages 85-92, San Diego, California, February 1997.
-
(1997)
Proceedings of Internet Society Symposium on Network and Distributed System Security
, pp. 85-92
-
-
Smith, B.R.1
Murthy, S.2
Garcia-Luna-Aceves, J.J.3
-
28
-
-
79952569372
-
Leader election algorithms for wireless ad hoc networks
-
April
-
S. Vasudevan, B. DeCleene, N. Immerman, J. Kurose, and D. Towsley. Leader election algorithms for wireless ad hoc networks. In The Third DARPA Information Survivability Conference and Exposition (DISCEX III), April 2003.
-
(2003)
The Third DARPA Information Survivability Conference and Exposition (DISCEX III)
-
-
Vasudevan, S.1
Decleene, B.2
Immerman, N.3
Kurose, J.4
Towsley, D.5
-
29
-
-
4544221255
-
Secure ad hoc on-demand distance vector (SAODV) routing
-
draft-guerrero-manet-saodv-00.txt, August 2001 (Work in Progress), August
-
M. G. Zapata. Secure ad hoc on-demand distance vector (SAODV) routing. IETF Internet Draft, draft-guerrero-manet-saodv-00.txt, August 2001 (Work in Progress), August 2001.
-
(2001)
IETF Internet Draft
-
-
Zapata, M.G.1
-
31
-
-
0033357103
-
Securing ad hoc networks
-
Nov/Dec
-
L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, Nov/Dec 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|