-
1
-
-
77956574096
-
Challenges in intrusion detection for wireless ad-hoc networks
-
P. Brutch, and C. Ko, "Challenges in intrusion detection for wireless ad-hoc networks," Applications and the Internet Workshops, 2003, pp. 368-373.
-
(2003)
Applications and the Internet Workshops
, pp. 368-373
-
-
Brutch, P.1
Ko, C.2
-
2
-
-
48349114636
-
-
The National Institute of Standards and Technology.ANTDwebmaster.Mav,2001 . Mobile ad hoc network. Available: http://w3.antd.nist.gov
-
The National Institute of Standards and Technology.ANTDwebmaster.Mav,2001 . Mobile ad hoc network. Available: http://w3.antd.nist.gov
-
-
-
-
3
-
-
24344460142
-
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
-
Master's thesis, Lund Institute of Technology, Sweden, January, Available
-
A. Hamidian, "A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2", Master's thesis, Lund Institute of Technology, Sweden, January 2003, Available: http://www.telecom.lth.se/Personal/alexh/rapport.pdf
-
(2003)
-
-
Hamidian, A.1
-
4
-
-
84950162203
-
-
O. Kachirski, and R. Guha, Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. Proceedings of the IEEE Workshop on Knowledge Media Networking,2002,pp.l53-158.
-
O. Kachirski, and R. Guha, "Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks". Proceedings of the IEEE Workshop on Knowledge Media Networking,2002,pp.l53-158.
-
-
-
-
5
-
-
1842665110
-
-
A. Mishra, K. Nadkarni, and A. Patcha, Intrusion detection in wireless ad hoc networks, Proceedings of IEEE Personal Communications. 11, 2004, pp. 48-60.
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," Proceedings of IEEE Personal Communications. Vol. 11, 2004, pp. 48-60.
-
-
-
-
6
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Pages
-
Marti, S., Giuli, T., and Lai, K. 2000. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Proceedings of the Sixth Annual International Conference on Mobile Communication and Networking, Boston, Massachusetts. 2(3). Page(s): 123-129.
-
(2000)
Proceedings of the Sixth Annual International Conference on Mobile Communication and Networking, Boston, Massachusetts. 2(3)
, pp. 123-129
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
-
8
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Y. Zhang, W. Lee, and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM/ Kluwer Wireless Networks Journal, vol. 9, 2003, pp. 545-556.
-
(2003)
ACM/ Kluwer Wireless Networks Journal
, vol.9
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
9
-
-
84890079004
-
Real-time Intrusion Detection for Ad hoc Networks
-
L. Stamouli, P.G. Argyroudis, and H. Tewari, "Real-time Intrusion Detection for Ad hoc Networks," Proceedings of sixth IEEE International Symposium Computers and Communications, June 2005, pp.374-380.
-
(2005)
Proceedings of sixth IEEE International Symposium Computers and Communications, June
, pp. 374-380
-
-
Stamouli, L.1
Argyroudis, P.G.2
Tewari, H.3
-
10
-
-
34547238643
-
An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks
-
A. Smith, "An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks," 5th Nat'l, Colloq. for Info. Sys. Sec. Education, 2001.
-
(2001)
5th Nat'l, Colloq. for Info. Sys. Sec. Education
-
-
Smith, A.1
-
11
-
-
48349148400
-
-
P. Albers, O. Camp, Percher, J. Bernard, Ludovic and R. Puttini, Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches, 1st Int'l. Wksp. Wireless Info. Sys.,Ciudad Real, Spain, pp. 3-6, 2002.
-
P. Albers, O. Camp, Percher, J. Bernard, Ludovic and R. Puttini, "Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches," 1st Int'l. Wksp. Wireless Info. Sys.,Ciudad Real, Spain, pp. 3-6, 2002.
-
-
-
-
13
-
-
28344455767
-
-
A. Hijazi, and N. Nasser, Wireless Using mobile agents for intrusion detection in wireless ad hoc networks, Published Second 1FIP International Conference on March 2005, pp. 362-366.
-
A. Hijazi, and N. Nasser, "Wireless Using mobile agents for intrusion detection in wireless ad hoc networks," Published Second 1FIP International Conference on March 2005, pp. 362-366.
-
-
-
-
15
-
-
85178866429
-
-
B. Sun, H., Chenand, and L. Li, An intrusion detection system for AODV, ICECCS 2005. Proceedings of 10th IEEE International Conference on Engineering of Complex Computer Systems, 2005, pp. 358-365.
-
B. Sun, H., Chenand, and L. Li, "An intrusion detection system for AODV," ICECCS 2005. Proceedings of 10th IEEE International Conference on Engineering of Complex Computer Systems, 2005, pp. 358-365.
-
-
-
-
16
-
-
21644441634
-
-
G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer, and R.A. Kemmerer, An intrusion detection tool for AODV-based ad hoc wireless networks, Computer Security Applications Conference, 2004, 20th Annual 6-10 Dec, pp. 16-27.
-
G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer, and R.A. Kemmerer, "An intrusion detection tool for AODV-based ad hoc wireless networks," Computer Security Applications Conference, 2004, 20th Annual 6-10 Dec, pp. 16-27.
-
-
-
|