-
1
-
-
27144489164
-
A Tutorial on Support Vector Machines for Pattern Recognition
-
Springer-Verlag, London, UK
-
Burges C.J.C.: A Tutorial on Support Vector Machines for Pattern Recognition. In: Knowledge Discovery and Data Mining, Vol. 2, pp. 121-167, Springer-Verlag, London, UK (1998).
-
(1998)
Knowledge Discovery and Data Mining
, vol.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
2
-
-
4143084830
-
SVM-based Intrusion Detection System for Wireless Ad Hoc Networks
-
Orlando, Florida, USA
-
Deng H., Zeng Q., Agrawal D.P.: SVM-based Intrusion Detection System for Wireless Ad Hoc Networks. In: Proceedings of the IEEE Vehicular Technology Conference (VTC03), pp. 2147-2151. Orlando, Florida, USA (2003).
-
(2003)
Proceedings of the IEEE Vehicular Technology Conference (VTC03)
, pp. 2147-2151
-
-
Deng, H.1
Zeng, Q.2
Agrawal, D.P.3
-
3
-
-
52249095096
-
-
Djenouri D., Mahmoudi O., Bouamama M., Llewellyn-Jones D., Merabti M.: On Securing MANET Routing Protocol Against Control Packet Dropping. In: Proceedings of IEEE International Conference on Pervasive Services (ICPS' 07), pp. 100-108, lstanbul, Turkey (2007).
-
Djenouri D., Mahmoudi O., Bouamama M., Llewellyn-Jones D., Merabti M.: On Securing MANET Routing Protocol Against Control Packet Dropping. In: Proceedings of IEEE International Conference on Pervasive Services (ICPS' 07), pp. 100-108, lstanbul, Turkey (2007).
-
-
-
-
4
-
-
51149086972
-
-
GloMoSim: Global Information Systems Simulation Library, Version 2.0 2000
-
GloMoSim: Global Information Systems Simulation Library, Version 2.0 (2000).
-
-
-
-
5
-
-
0037629724
-
Cross-Feature analysis for Detecting Ad-Hoc Routing Anomalies
-
Rhode Island, USA
-
Huang Y., Fan, W., Lee W., Yu P.: Cross-Feature analysis for Detecting Ad-Hoc Routing Anomalies. In: Proceedings of the 23rd International Conference on Distributed Computing Systems, pp. 478. Rhode Island, USA (2003).
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems
, pp. 478
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.4
-
7
-
-
0032676506
-
A Data Mining Framework for Building Intrusion Detection Models
-
Oakland, CA
-
Lee W., Stolfo S.J., Mok K.W.: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120-132, Oakland, CA, (1999).
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
9
-
-
52249094893
-
-
Mitrokotsa A., Komninos N., Douligeris C.: Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. In: Proceedings of IEEE International Conference on Pervasive Services 2007 (ICPS07), pp. 118-127, lstanbul, Turkey (2007).
-
Mitrokotsa A., Komninos N., Douligeris C.: Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. In: Proceedings of IEEE International Conference on Pervasive Services 2007 (ICPS07), pp. 118-127, lstanbul, Turkey (2007).
-
-
-
-
12
-
-
84903836776
-
How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad-hoc Routing Protocols
-
NY
-
Ning, P.; Sun,AK.: How to Misuse AODV: a Case Study of Insider Attacks Against Mobile Ad-hoc Routing Protocols. In: Proceedings of the 2003 IEEE Workshop on Information Assurance, pp. 60-67, NY (2003).
-
(2003)
Proceedings of the 2003 IEEE Workshop on Information Assurance
, pp. 60-67
-
-
Ning, P.1
Sun, A.K.2
-
13
-
-
33747437914
-
Flooding Attack and Defence in Ad hoc Networks
-
Yi E, Hou Y.F., Zhong Y., Zhang S., Dai Z.: Flooding Attack and Defence in Ad hoc Networks. In: Systems Engineering and Electronics, Vol. 17, No. 2, pp. 410-416 (2006).
-
(2006)
Systems Engineering and Electronics
, vol.17
, Issue.2
, pp. 410-416
-
-
Yi, E.1
Hou, Y.F.2
Zhong, Y.3
Zhang, S.4
Dai, Z.5
-
14
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Zhang Y., Lee W., Huang Y.: Intrusion Detection Techniques for Mobile Wireless Networks. In: Wireless Networks Vol. 9, No. 5, pp. 545-556. (2003).
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
|