-
2
-
-
9144237639
-
-
An adaptive and predictive security model for mobile ad hocnetworks. Kluwer Personal Communications Journal, Security Special Issue for Next Generation Wireless Networks
-
Alampalayam, S. P., & Kumar, A. (2004b). An adaptive and predictive security model for mobile ad hocnetworks. Kluwer Personal Communications Journal, Security Special Issue for Next Generation Wireless Networks, 29, 263-281.
-
(2004)
-
-
Alampalayam, S.P.1
Kumar, A.2
-
3
-
-
33744988557
-
Mobile ad hoc networks security - a taxonomy
-
Alampalayam, S. P., Kumar, A., & Srinivasan, S. (2005). Mobile ad hoc networks security - a taxonomy. In Proceedings of the ICACT Conference, (pp. 839-844).
-
(2005)
Proceedings of the ICACT Conference
, pp. 839-844
-
-
Alampalayam, S.P.1
Kumar, A.2
Srinivasan, S.3
-
5
-
-
12744258854
-
Case-based agents forpacket-level intrusion detection in ad hoc networks
-
Guha, R., Kachirski, O., Schwartz, D.G., Stoecklin, S., & Yilmaz, E. (2002). Case-based agents forpacket-level intrusion detection in ad hoc networks. In Proceedings of the Seventeenth International Symposium on Computer and Information Sciences, (pp. 315-320).
-
(2002)
Proceedings of the Seventeenth International Symposium on Computer and Information Sciences
, pp. 315-320
-
-
Guha, R.1
Kachirski, O.2
Schwartz, D.G.3
Stoecklin, S.4
Yilmaz, E.5
-
6
-
-
27644564187
-
Quality-of-Protection (QoP) - an online monitoring and self-protection mechanism
-
Hariri, S., Qu, G., Modukuri, R., Chen, H., & Yousif, M. (2005). Quality-of-Protection (QoP) - an online monitoring and self-protection mechanism. IEEE Journal on Selected Areas in Communications, 23(10), 1983-1993.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.10
, pp. 1983-1993
-
-
Hariri, S.1
Qu, G.2
Modukuri, R.3
Chen, H.4
Yousif, M.5
-
7
-
-
0037629724
-
Cross-feature analysis for detecting ad hoc routing anomalies
-
Huang, Y., Fan, W., Lee, W., & Yu, P. S. (2003). Cross-feature analysis for detecting ad hoc routing anomalies. In Proceedings of the Twenty Third International Conference on Distributed Computing Systems, (pp. 478-487).
-
(2003)
Proceedings of the Twenty Third International Conference on Distributed Computing Systems
, pp. 478-487
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.S.4
-
9
-
-
51149099465
-
Implementing and evaluating an adaptive secure routing protocol for mobile ad hoc network
-
California
-
Jin, L., Zhang, Z., Lai, D., & Zhou, H. (2006). Implementing and evaluating an adaptive secure routing protocol for mobile ad hoc network. In Proceedings of the 5th Wireless Telecommunications Symposium (WTS), California.
-
(2006)
Proceedings of the 5th Wireless Telecommunications Symposium (WTS)
-
-
Jin, L.1
Zhang, Z.2
Lai, D.3
Zhou, H.4
-
11
-
-
33646480610
-
An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks
-
Nie, J., Wen, J., Luo, J., He, X., & Zhou, Z. (2006). An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks. Fuzzy Sets and Systems, 157(12), 1704-1712.
-
(2006)
Fuzzy Sets and Systems
, vol.157
, Issue.12
, pp. 1704-1712
-
-
Nie, J.1
Wen, J.2
Luo, J.3
He, X.4
Zhou, Z.5
-
12
-
-
1842693637
-
A new intrusion detection method based on process profiling
-
Okazaki, Y., Sato, I., & Goto, S. (2002). A new intrusion detection method based on process profiling. In Proceedings of the Symposium on Applications and the Internet, (pp. 82-91).
-
(2002)
Proceedings of the Symposium on Applications and the Internet
, pp. 82-91
-
-
Okazaki, Y.1
Sato, I.2
Goto, S.3
-
13
-
-
0028424412
-
Why triangular membership functions?
-
Pedrycz, W. (1994). Why triangular membership functions?. Fuzzy Sets and Systems, 64(1), 21-30.
-
(1994)
Fuzzy Sets and Systems
, vol.64
, Issue.1
, pp. 21-30
-
-
Pedrycz, W.1
-
14
-
-
35248836100
-
A modular architecture for distribute IDS in MANET structures
-
Springer-Verlag
-
Puttini, R., Percher, J., Me, L., Camp, O., & De Souza, R. (2003). A modular architecture for distribute IDS in MANET structures. Lecture Notes on Computer Science, 2669, 91-113. Springer-Verlag.
-
(2003)
Lecture Notes on Computer Science
, vol.2669
, pp. 91-113
-
-
Puttini, R.1
Percher, J.2
Me, L.3
Camp, O.4
De Souza, R.5
-
15
-
-
10444259711
-
Abnormality metrics to detect and protect against network attacks
-
Qu, G., Hariri, S., Jangiti, S., Hussain, S., Oh, S., Fayssal, S., & Yousif, M. (2004). Abnormality metrics to detect and protect against network attacks. In Proceedings of the IEEE/4 CS International Conference on Pervasive Services, (pp. 105-111).
-
(2004)
Proceedings of the IEEE/4 CS International Conference on Pervasive Services
, pp. 105-111
-
-
Qu, G.1
Hariri, S.2
Jangiti, S.3
Hussain, S.4
Oh, S.5
Fayssal, S.6
Yousif, M.7
-
20
-
-
34250761381
-
Integration of mobility and intrusion detection for wireless ad hoc networks
-
Sun, B., Wu, K., & Pooch, U. W. (2006). Integration of mobility and intrusion detection for wireless ad hoc networks. International Journal of Communication Systems, 20(6), 695-721.
-
(2006)
International Journal of Communication Systems
, vol.20
, Issue.6
, pp. 695-721
-
-
Sun, B.1
Wu, K.2
Pooch, U.W.3
-
23
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang, Y., Lee, W., & Huang Y. (2003). Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5), 545-556.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
|