-
2
-
-
33845889547
-
Detecting Unauthorized and Compromised Nodes in Mobile Ad-Hoc Networks
-
Elsevier Press, April
-
N. Komninos, D. Vergados and C. Douligeris, "Detecting Unauthorized and Compromised Nodes in Mobile Ad-Hoc Networks", Journal in Ad Hoc Networks, Elsevier Press, Vol. 5, (3), April 2007, pp. 289-298.
-
(2007)
Journal in Ad Hoc Networks
, vol.5
, Issue.3
, pp. 289-298
-
-
Komninos, N.1
Vergados, D.2
Douligeris, C.3
-
3
-
-
84899402159
-
-
J. Seitz, Digital Watermarking for Digital Media, Information Science Publishing, Information Resources Press Arlington.VA, USA, 2005.
-
J. Seitz, "Digital Watermarking for Digital Media", Information Science Publishing, Information Resources Press Arlington.VA, USA, 2005.
-
-
-
-
4
-
-
52249104494
-
-
O. Zhang, New techniques for Digital Watermarking, ProQuest / UMI, 2006-12-13.
-
O. Zhang, "New techniques for Digital Watermarking", ProQuest / UMI, 2006-12-13.
-
-
-
-
5
-
-
52249089502
-
A survey of Watermarking Security, Digital Watermarking
-
Sept, Siena, Italy, pp
-
T. Furon, "A survey of Watermarking Security, Digital Watermarking", In Proc. of 4h International Workshop on Digital Watermarking (IWDW'05), Sept. 2005, Siena, Italy, pp. 201-215.
-
(2005)
Proc. of 4h International Workshop on Digital Watermarking (IWDW'05)
, pp. 201-215
-
-
Furon, T.1
-
6
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Sept
-
Y. Zhang, W. Lee, Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks", Wireless Networks vol. 9, no. 5, pp. 545-556, Sept. 2003.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
7
-
-
4544258840
-
A Cooperative Intrusion Detection System for Ad Hoc Networks
-
Fairfax, Virginia, USA, pp
-
Y. Huang, and W. Lee, "A Cooperative Intrusion Detection System for Ad Hoc Networks", In Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), October 2003, Fairfax, Virginia, USA, pp. 135-147.
-
(2003)
Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), October
, pp. 135-147
-
-
Huang, Y.1
Lee, W.2
-
8
-
-
4143084830
-
SVM-based Intrusion Detection System for Wireless Ad Hoc Networks
-
Oct, Orlando, Florida, USA, pp
-
H. Deng, Q. Zeng, and D. P. Agrawal, "SVM-based Intrusion Detection System for Wireless Ad Hoc Networks", In Proceedings of the IEEE Vehicular Technology Conference (VTC'03), Oct. 2003, Orlando, Florida, USA, pp. 2147-2151.
-
(2003)
Proceedings of the IEEE Vehicular Technology Conference (VTC'03)
, pp. 2147-2151
-
-
Deng, H.1
Zeng, Q.2
Agrawal, D.P.3
-
9
-
-
84950162203
-
Intrusion Detection Using Mobile agents in wireless Ad hoc Networks
-
Kyoto Japan, pp
-
O. Kachirski, and R. Guha, "Intrusion Detection Using Mobile agents in wireless Ad hoc Networks", In Proc. of the IEEE workshop on Knowledge Media Networking, July 2002, Kyoto Japan, pp. 153-158.
-
(2002)
Proc. of the IEEE workshop on Knowledge Media Networking, July
, pp. 153-158
-
-
Kachirski, O.1
Guha, R.2
-
10
-
-
33745457611
-
MAC Layer Anomaly Detection in Ad Hoc Networks
-
New York, USA, pp
-
Y. Liu, Y. Li, H. Man, "MAC Layer Anomaly Detection in Ad Hoc Networks", In Proceedings of 6th IEEE Information Assurance Workshop, June 2005, New York, USA, pp.402- 409.
-
(2005)
Proceedings of 6th IEEE Information Assurance Workshop, June
, pp. 402-409
-
-
Liu, Y.1
Li, Y.2
Man, H.3
-
11
-
-
0037629724
-
Cross-Feature analysis for Detecting Ad-Hoc Routing Anomalies
-
Rhode Island, USA, pp
-
Y. Huang, W. Fan, W. Lee, P.Yu, "Cross-Feature analysis for Detecting Ad-Hoc Routing Anomalies", In Proc. of the 23rd International Conference on Distributed Computing Systems, May 2003, Rhode Island, USA, pp. 478.
-
(2003)
Proc. of the 23rd International Conference on Distributed Computing Systems, May
, pp. 478
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.4
-
12
-
-
24744460284
-
Towards an Intrusion Detection System for Pervasive Computing Environments
-
Las Vegas, Nevada, April
-
P. Kannadiga, M. Zulkernine, and S. Ahamed, "Towards an Intrusion Detection System for Pervasive Computing Environments", In Proc. of the International Conference on Information Technology (ITCC'05), Las Vegas, Nevada, April 200, pp. 277-282.
-
Proc. of the International Conference on Information Technology (ITCC'05)
, vol.200
, pp. 277-282
-
-
Kannadiga, P.1
Zulkernine, M.2
Ahamed, S.3
-
13
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
Paris, France, pp
-
X. Wang, D.S. Reeves, S.F. Wu, J. Yuill, "Sleepy watermark tracing: an active network-based intrusion response framework", In Proc. of the IFIP 16th International Conference of Information Security, June 2001, Paris, France, pp. 369-384.
-
(2001)
Proc. of the IFIP 16th International Conference of Information Security, June
, pp. 369-384
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
Yuill, J.4
-
14
-
-
40949086440
-
Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems
-
France, pp
-
R. Páez, C. Satizábal, J. Forné, "Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems", In Proc. of the International Conference on Internet Surveillance & Protection (ICISP '06), August 2006, Côte d'Azur, France, pp. 26.
-
Proc. of the International Conference on Internet Surveillance & Protection (ICISP '06), August 2006, Côte d'Azur
, pp. 26
-
-
Páez, R.1
Satizábal, C.2
Forné, J.3
-
15
-
-
0003413187
-
-
Prentice-Hall, New Jersey, USA, 2nd edition
-
S. Haykin, "Neural Networks: A comprehensive Foundation", Prentice-Hall, New Jersey, USA, 2nd edition, 1999.
-
(1999)
Neural Networks: A comprehensive Foundation
-
-
Haykin, S.1
-
16
-
-
0001931484
-
Data Mining and Knowledge Discovery with Emergent SOFMs for Multivariate Time Series
-
Elsevier Science, pp
-
A. Ultsch, "Data Mining and Knowledge Discovery with Emergent SOFMs for Multivariate Time Series", In Kohonen Maps, Elsevier Science, pp. 33-46, 1999.
-
(1999)
Kohonen Maps
, pp. 33-46
-
-
Ultsch, A.1
-
17
-
-
26944499910
-
-
University of Marburg, Department of Computer Science, Technical Report, Nr. 36, December
-
A. Ultsch, "U*-Matrix: a Tool to visualize Clusters in high dimensional Data", University of Marburg, Department of Computer Science, Technical Report, Nr. 36, December 2003.
-
(2003)
U*-Matrix: A Tool to visualize Clusters in high dimensional Data
-
-
Ultsch, A.1
-
18
-
-
52249107953
-
-
A. Ultsch, F. Moerchen ESOM-Maps: tools for clustering, visualization, and classification with Emergent SOM, Tech. Report Dept. of Mathematics and Computer Science, University of Marburg, Germany, no.46, 2005.
-
A. Ultsch, F. Moerchen "ESOM-Maps: tools for clustering, visualization, and classification with Emergent SOM", Tech. Report Dept. of Mathematics and Computer Science, University of Marburg, Germany, no.46, 2005.
-
-
-
-
19
-
-
33846953083
-
-
Available from
-
Databionic ESOM Tools, Available from 〈http://databionic-esom. sourceforge.net/devel.html〉
-
Databionic ESOM Tools
-
-
|