-
1
-
-
84903836776
-
How to misuse AODV: A case study of insider attacks against mobile adhoc routing protocols
-
West Point, June
-
Peng Ning, Run Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Adhoc Routing Protocols," in Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003.
-
(2003)
Proceedings of the 4th Annual IEEE Information Assurance Workshop
, pp. 60-67
-
-
Ning, P.1
Sun, R.2
-
3
-
-
0042877095
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Swiss Federal Institute of Technology, Lausanne, August
-
L. Buttyán and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks Technical Report No. DSC/2001/046, Swiss Federal Institute of Technology, Lausanne, August 2001
-
(2001)
Technical Report No. DSC/2001/046
, vol.DSC-2001-046
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
4
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for adHoc networks
-
ACM, Atlanta, Sept.
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. "Ariadne: A Secure On-Demand Routing Protocol for AdHoc Networks. In Proceedings of the Eighth ACM Intl. Conf. on Mobile Computing and Networking (MobiCom '02), ACM, Atlanta, Sept. 2002, pp 12-23.
-
(2002)
Proceedings of the Eighth ACM Intl. Conf. on Mobile Computing and Networking (MobiCom '02)
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
K. Ilgun, R. Kemmerer, and P. Porras, "State Transition Analysis: A Rule-based Intrusion Detection Approach", IEEE Transactions of Software Engineering, 2(13):181-199, March 1995.
-
(1995)
IEEE Transactions of Software Engineering
, vol.2
, Issue.13
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
6
-
-
0004118981
-
The NIDES statistical component description and justification
-
Computer Science Laboratory, SRI International, Menlo Park, CA, Mar
-
H. Javitz and A. Valdes, "The NIDES Statistical Component Description and Justification," Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA, Mar 1994.
-
(1994)
Technical Report
-
-
Javitz, H.1
Valdes, A.2
-
13
-
-
0842331554
-
Detection of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
-
R. Rao and G. Kesidis, "Detection of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited", Brazilian Journal of Telecommunications,2003
-
(2003)
Brazilian Journal of Telecommunications
-
-
Rao, R.1
Kesidis, G.2
-
14
-
-
0036999061
-
Intrusion-resistant ad hoc wireless networks
-
Oct.
-
R. Ramanujan, S. Kudige, T. Nguyen, S. Takkella, and F. Adelstein, "Intrusion-Resistant Ad Hoc Wireless Networks", Proceedings of MILCOM 2002, Oct. 2002.
-
(2002)
Proceedings of MILCOM 2002
-
-
Ramanujan, R.1
Kudige, S.2
Nguyen, T.3
Takkella, S.4
Adelstein, F.5
-
17
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas. Securing ad hoc networks. In IEEE Networks, 13(6):24-30, 1999.
-
(1999)
IEEE Networks
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
20
-
-
4544317839
-
-
Private Communication
-
E. Belding-Royer, Private Communication, 2003.
-
(2003)
-
-
Belding-Royer, E.1
|