-
1
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang, Y., Lee, W., and Huang, Y. 2003. Intrusion Detection Techniques for Mobile Wireless Networks, ACM WINET.
-
(2003)
ACM WINET
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
2
-
-
33947146706
-
Distributed intrusion detection for mobile ad hoc networks
-
1619986, Proceedings - 2005 Symposium on Applications and the Internet Workshops, SAINT2005
-
Yi, P., et al.2005. Distributed Intrusion Detection for Mobile Ad hoc Networks, Proceedings of the 2005 Symposium on Applications and the Internet Workshops (SAINT-W'05), 94-97. (Pubitemid 46402087)
-
(2005)
Proceedings - 2005 Symposium on Applications and the Internet Workshops, SAINT2005
, vol.2005
, pp. 94-97
-
-
Yi, P.1
Jiang, Y.2
Zhong, Y.3
Zhang, S.4
-
3
-
-
0004116989
-
-
Second Edition. MIT Press and McGraw-Hill, Section 22.1: Representations of graphs
-
Cormen, T., et al. 2001. Introduction to Algorithms, Second Edition. MIT Press and McGraw-Hill, Section 22.1: Representations of graphs, 527-531.
-
(2001)
Introduction to Algorithms
, pp. 527-531
-
-
Cormen, T.1
-
4
-
-
3042552702
-
Risk management using behavior based attack graphs
-
Dantu, R., Loper, K., Kolan, P., 2004. Risk Management using Behavior based Attack Graphs, International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 1.
-
(2004)
International Conference on Information Technology: Coding and Computing (ITCC'04)
, vol.1
-
-
Dantu, R.1
Loper, K.2
Kolan, P.3
-
5
-
-
35048885033
-
Tools for generating and analyzing attack graphs
-
Sheyner, O., and Wing, J.,2003. Tools for Generating and Analyzing Attack Graphs, FMCO 2003, 344-372.
-
(2003)
FMCO 2003
, pp. 344-372
-
-
Sheyner, O.1
Wing, J.2
-
6
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., and Wing, J., 2002, Automated Generation and Analysis of Attack Graphs, IEEE Symposium on Security and Privacy 2002, 273-284.
-
(2002)
IEEE Symposium on Security and Privacy 2002
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
7
-
-
1042267106
-
A graph-based network-vulnerability analysis system
-
Swiler, L., Phillips, C., and Gaylor, T., 1998. A Graph-Based Network-Vulnerability Analysis System, tech. report, Sandia National Labs.
-
(1998)
Tech. Report, Sandia National Labs
-
-
Swiler, L.1
Phillips, C.2
Gaylor, T.3
-
9
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Hu, Y., Perrig, A., and Johnson, D., 2003. Packet leashes: a defense against wormhole attacks in wireless networks, in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 1976-1986.
-
(2003)
Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
11
-
-
27544468419
-
LITEWORP: A lightweight countermeasure for the Wormhole attack in multihop wireless networks
-
Khalil, I., Bagchi, S., and Shroff, N., 2005. LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks, DSN 2005, 612-621.
-
(2005)
DSN 2005
, pp. 612-621
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.3
-
13
-
-
33846293304
-
Understanding complex network attack graphs through clustered adjacency matrices, acsac
-
Noel, S., Jajodia, S., 2005. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices, acsac, 21st Annual Computer Security Applications Conference (ACSAC'05), 160-169.
-
(2005)
21st Annual Computer Security Applications Conference (ACSAC'05)
, pp. 160-169
-
-
Noel, S.1
Jajodia, S.2
-
14
-
-
21644481812
-
Correlating intrusion events and building attack scenarios through attack graph distances
-
acsac
-
Noel, S., Robertson, E., and Jajodia, S., 2004. Correlating Intrusion Events and Building Attack Scenarios through Attack Graph Distances," acsac, 20th Annual Computer Security Applications Conference (ACSAC'04), 350-359.
-
(2004)
20th Annual Computer Security Applications Conference (ACSAC'04)
, pp. 350-359
-
-
Noel, S.1
Robertson, E.2
Jajodia, S.3
|