메뉴 건너뛰기




Volumn 265, Issue , 2008, Pages 133-144

Intrusion detection in mobile Ad Hoc Networks using classification algorithms

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; INTRUSION DETECTION; MOBILE AD HOC NETWORKS;

EID: 51149107246     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09490-8_12     Document Type: Conference Paper
Times cited : (19)

References (15)
  • 1
    • 27144489164 scopus 로고    scopus 로고
    • A Tutorial on Support Vector Machines for Pattern Recognition
    • Springer-Verlag, London, UK
    • Burges C.J.C.: A Tutorial on Support Vector Machines for Pattern Recognition. In: Knowledge Discovery and Data Mining, Vol. 2, pp. 121-167, Springer-Verlag, London, UK (1998).
    • (1998) Knowledge Discovery and Data Mining , vol.2 , pp. 121-167
    • Burges, C.J.C.1
  • 3
    • 52249095096 scopus 로고    scopus 로고
    • Djenouri D., Mahmoudi O., Bouamama M., Llewellyn-Jones D., Merabti M.: On Securing MANET Routing Protocol Against Control Packet Dropping. In: Proceedings of IEEE International Conference on Pervasive Services (ICPS' 07), pp. 100-108, lstanbul, Turkey (2007).
    • Djenouri D., Mahmoudi O., Bouamama M., Llewellyn-Jones D., Merabti M.: On Securing MANET Routing Protocol Against Control Packet Dropping. In: Proceedings of IEEE International Conference on Pervasive Services (ICPS' 07), pp. 100-108, lstanbul, Turkey (2007).
  • 4
    • 51149086972 scopus 로고    scopus 로고
    • GloMoSim: Global Information Systems Simulation Library, Version 2.0 2000
    • GloMoSim: Global Information Systems Simulation Library, Version 2.0 (2000).
  • 9
    • 52249094893 scopus 로고    scopus 로고
    • Mitrokotsa A., Komninos N., Douligeris C.: Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. In: Proceedings of IEEE International Conference on Pervasive Services 2007 (ICPS07), pp. 118-127, lstanbul, Turkey (2007).
    • Mitrokotsa A., Komninos N., Douligeris C.: Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. In: Proceedings of IEEE International Conference on Pervasive Services 2007 (ICPS07), pp. 118-127, lstanbul, Turkey (2007).
  • 12
    • 84903836776 scopus 로고    scopus 로고
    • How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad-hoc Routing Protocols
    • NY
    • Ning, P.; Sun,AK.: How to Misuse AODV: a Case Study of Insider Attacks Against Mobile Ad-hoc Routing Protocols. In: Proceedings of the 2003 IEEE Workshop on Information Assurance, pp. 60-67, NY (2003).
    • (2003) Proceedings of the 2003 IEEE Workshop on Information Assurance , pp. 60-67
    • Ning, P.1    Sun, A.K.2
  • 14
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion Detection Techniques for Mobile Wireless Networks
    • Zhang Y., Lee W., Huang Y.: Intrusion Detection Techniques for Mobile Wireless Networks. In: Wireless Networks Vol. 9, No. 5, pp. 545-556. (2003).
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.