메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1525-1530

CRADS: Integrated cross layer approach for detecting routing attacks in MANETs

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE AD HOC NETWORKS; NETWORK ROUTING; SUPPORT VECTOR MACHINES;

EID: 51649105987     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/wcnc.2008.273     Document Type: Conference Paper
Times cited : (30)

References (14)
  • 2
    • 27144489164 scopus 로고    scopus 로고
    • A Tutorial on Support Vector Machines for Pattern Recognition
    • Burges., C.J.C., A Tutorial on Support Vector Machines for Pattern Recognition. Data Mining and Knowledge Discovery, 1998. 2(2): p. 121-167.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 3
  • 4
    • 34548323745 scopus 로고    scopus 로고
    • Attack analysis and detection for ad hoc routing protocols
    • SPRINGER-VERLAG BERLIN: Berlin. p
    • Huang, Y.A. and W. Lee, Attack analysis and detection for ad hoc routing protocols, in Recent Advances in Intrusion Detection, Proceedings. 2004, SPRINGER-VERLAG BERLIN: Berlin. p. 125-145.
    • (2004) Recent Advances in Intrusion Detection, Proceedings , pp. 125-145
    • Huang, Y.A.1    Lee, W.2
  • 5
    • 33847379306 scopus 로고    scopus 로고
    • Little, M. TEALab: A Testbed for Ad hoc Networking Security Research. in Military Communications Conference, 2005. MILCOM 2005. IEEE. 2005.
    • Little, M. TEALab: A Testbed for Ad hoc Networking Security Research. in Military Communications Conference, 2005. MILCOM 2005. IEEE. 2005.
  • 10
    • 4143084830 scopus 로고    scopus 로고
    • Deng, H., Q.-A. Zeng, and D.P. Agrawal, SVM-based intrusion detection system for wireless ad hoc networks. Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, 2003. 3: p. 2147-2151 3.
    • Deng, H., Q.-A. Zeng, and D.P. Agrawal, SVM-based intrusion detection system for wireless ad hoc networks. Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, 2003. 3: p. 2147-2151 Vol. 3.
  • 12
    • 24144437206 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • Ning, P. and K. Sun, How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks, 2005. 3(6): p. 795-819.
    • (2005) Ad Hoc Networks , vol.3 , Issue.6 , pp. 795-819
    • Ning, P.1    Sun, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.