-
1
-
-
0035178273
-
-
S. Bhargava, D. Agrawal, Security enhancements in aodv protocol for wireless ad-hoc networks, in: Proceedings of IEEE Vehicular Techology Conference, IEEE CS Press, 2001, pp. 2143-2147.
-
S. Bhargava, D. Agrawal, Security enhancements in aodv protocol for wireless ad-hoc networks, in: Proceedings of IEEE Vehicular Techology Conference, IEEE CS Press, 2001, pp. 2143-2147.
-
-
-
-
2
-
-
18144421528
-
-
Bo Sun, Kui Wu, U.W. Pooch, Towards adaptive intrusion detection in mobile ad-hoc networks, in: IEEE Global Telecommunications Conference (GLOBECOM'04), vol. 6, 29 November-3 December 2004, pp. 3551-3555, doi:10.1109/GLOCOM.2004.1379027.
-
Bo Sun, Kui Wu, U.W. Pooch, Towards adaptive intrusion detection in mobile ad-hoc networks, in: IEEE Global Telecommunications Conference (GLOBECOM'04), vol. 6, 29 November-3 December 2004, pp. 3551-3555, doi:10.1109/GLOCOM.2004.1379027.
-
-
-
-
3
-
-
77956574096
-
-
P. Brutch, C. Ko, Challenges in intrusion detection for wireless ad-hoc networks, in: Symposium on Applications and the Internet Workshops, 27-31 January 2003, pp. 368-373.
-
P. Brutch, C. Ko, Challenges in intrusion detection for wireless ad-hoc networks, in: Symposium on Applications and the Internet Workshops, 27-31 January 2003, pp. 368-373.
-
-
-
-
5
-
-
30144440941
-
Dempster-Shafer theory for intrusion detection in ad-hoc networks
-
10.1109/MIC.2005.123
-
Chen T.M., and Venkataramanan V. Dempster-Shafer theory for intrusion detection in ad-hoc networks. IEEE Internet Computing 9 6 (2005) 35-41 10.1109/MIC.2005.123
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 35-41
-
-
Chen, T.M.1
Venkataramanan, V.2
-
7
-
-
33747289360
-
-
A. Hasswa, M. Zulkernine, H. Hassanein, Routeguard: an intrusion detection and response system for mobile ad-hoc networks, in: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'2005), vol. 3, 22-24 August 2005, pp. 336-343, doi:10.1109/WIMOB.2005.1512922.
-
A. Hasswa, M. Zulkernine, H. Hassanein, Routeguard: an intrusion detection and response system for mobile ad-hoc networks, in: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'2005), vol. 3, 22-24 August 2005, pp. 336-343, doi:10.1109/WIMOB.2005.1512922.
-
-
-
-
8
-
-
28344455767
-
-
A. Hijazi, N. Nasser, "Using mobile agents for intrusion detection in wireless ad-hoc networks", in: Second IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2005), 6-8 March, 2005, pp. 362-366. (doi:10.1109/WOCN.2005.1436049).
-
A. Hijazi, N. Nasser, "Using mobile agents for intrusion detection in wireless ad-hoc networks", in: Second IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2005), 6-8 March, 2005, pp. 362-366. (doi:10.1109/WOCN.2005.1436049).
-
-
-
-
9
-
-
33846997515
-
-
Jianhua Song, Fan Hong, Yajun Guo, A distributed monitoring mechanism for mobile ad-hoc networks, in: Eighth International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN 2005), 7-9 December 2005, pp. 236-240, doi:10.1109/ISPAN.2005.6.
-
Jianhua Song, Fan Hong, Yajun Guo, A distributed monitoring mechanism for mobile ad-hoc networks, in: Eighth International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN 2005), 7-9 December 2005, pp. 236-240, doi:10.1109/ISPAN.2005.6.
-
-
-
-
10
-
-
84866538231
-
-
F. Kargl, A. Klenk, M. Weber, S. Schlott, Sensors for detection of misbehaving nodes in MANETs, in: Proceedings of Detection of Intrusion and Malware and Vulnerability Assessment, Germany, 6-7 July 2004.
-
F. Kargl, A. Klenk, M. Weber, S. Schlott, Sensors for detection of misbehaving nodes in MANETs, in: Proceedings of Detection of Intrusion and Malware and Vulnerability Assessment, Germany, 6-7 July 2004.
-
-
-
-
12
-
-
33845889547
-
Detecting unauthorized and compromised nodes in mobile ad-hoc networks
-
Komninos N., Vergados D., and Douligeris C. Detecting unauthorized and compromised nodes in mobile ad-hoc networks. Journal in Ad Hoc Networks 5 3 (2006) 289-298
-
(2006)
Journal in Ad Hoc Networks
, vol.5
, Issue.3
, pp. 289-298
-
-
Komninos, N.1
Vergados, D.2
Douligeris, C.3
-
14
-
-
0004192381
-
-
CRC Press, Inc., USA
-
Menezes J.A., Vanstone A.S., and Van Oorschot C.P. Handbook of Applied Cryptography (2001), CRC Press, Inc., USA
-
(2001)
Handbook of Applied Cryptography
-
-
Menezes, J.A.1
Vanstone, A.S.2
Van Oorschot, C.P.3
-
15
-
-
53749099877
-
-
A. Mitrokotsa, N. Komninos, C. Douligeris, Intrusion detection & response in ad-hoc networks, in: N. Komninos (Ed.), Special Issue on Advances on Ad Hoc Network Security, International Journal on Computer Research 15(1) (2007).
-
A. Mitrokotsa, N. Komninos, C. Douligeris, Intrusion detection & response in ad-hoc networks, in: N. Komninos (Ed.), Special Issue on Advances on Ad Hoc Network Security, International Journal on Computer Research 15(1) (2007).
-
-
-
-
16
-
-
1842665110
-
Intrusion detection in wireless ad-hoc networks
-
10.1109/MWC.2004.1269717
-
Mishra A., Nadkarni K., and Patcha A. Intrusion detection in wireless ad-hoc networks. IEEE Wireless Communications 11 1 (2004) 48-60 10.1109/MWC.2004.1269717
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
17
-
-
4544334682
-
-
K. Nadkarni, A. Mishra, A novel intrusion detection approach for wireless ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC. 2004), 21-25 March 2004, vol. 2, pp. 831-836.
-
K. Nadkarni, A. Mishra, A novel intrusion detection approach for wireless ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC. 2004), 21-25 March 2004, vol. 2, pp. 831-836.
-
-
-
-
18
-
-
15944395410
-
-
A. Patcha, J.-M Park, A game theoretic approach to modeling intrusion detection in mobile ad-hoc networks, in: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 10-11 June 2004, pp. 280-284 (doi:10.1109/IAW.2004.1437828).
-
A. Patcha, J.-M Park, A game theoretic approach to modeling intrusion detection in mobile ad-hoc networks, in: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 10-11 June 2004, pp. 280-284 (doi:10.1109/IAW.2004.1437828).
-
-
-
-
19
-
-
53749086854
-
-
C.E. Perkins, E.M. Belding-Royer, I. Chakeres, Ad Hoc On-Demand Distance-Vector Routing (AODV), IETF Internet Draft, October 2003.
-
C.E. Perkins, E.M. Belding-Royer, I. Chakeres, Ad Hoc On-Demand Distance-Vector Routing (AODV), IETF Internet Draft, October 2003.
-
-
-
-
20
-
-
84890079004
-
-
L. Stamouli, P.G. Argyroudis, H. Tewari, Real-time intrusion detection for ad-hoc networks, in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), 13-16 June 2005, pp. 374-380 (doi:10.1109/WOWMOM.2005.85).
-
L. Stamouli, P.G. Argyroudis, H. Tewari, Real-time intrusion detection for ad-hoc networks, in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), 13-16 June 2005, pp. 374-380 (doi:10.1109/WOWMOM.2005.85).
-
-
-
-
22
-
-
84952307800
-
-
B. Sun, K. Wu, U.W. Pooch, Routing anomaly detection in mobile ad-hoc networks. in: The 12th International Conference on Computer Communications and Networks (ICCCN 2003), 20-22 October 2003, pp. 25-31, doi: 10.1109/ICCCN.2003.1284145.
-
B. Sun, K. Wu, U.W. Pooch, Routing anomaly detection in mobile ad-hoc networks. in: The 12th International Conference on Computer Communications and Networks (ICCCN 2003), 20-22 October 2003, pp. 25-31, doi: 10.1109/ICCCN.2003.1284145.
-
-
-
-
23
-
-
53749083826
-
-
G. Thamilarasu, A. Balasubramanian, S. Mishra, R. Sridhar, A cross-layer based intrusion detection approach for wireless ad-hoc networks, in: IEEE International Conference on Mobile Adhoc and Sensor Systems, 7 November 2005, pp. 855-861, doi:10.1109/MAHSS.2005.1542882.
-
G. Thamilarasu, A. Balasubramanian, S. Mishra, R. Sridhar, A cross-layer based intrusion detection approach for wireless ad-hoc networks, in: IEEE International Conference on Mobile Adhoc and Sensor Systems, 7 November 2005, pp. 855-861, doi:10.1109/MAHSS.2005.1542882.
-
-
-
-
24
-
-
4544267132
-
-
D. Watkins, C. Scott, Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC. 2004), 21-25 March 2004, vol. 1, pp. 622-627.
-
D. Watkins, C. Scott, Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC. 2004), 21-25 March 2004, vol. 1, pp. 622-627.
-
-
-
-
25
-
-
6344287668
-
-
Yan Xia, Ren-Fa Li, Ken-Li Li, Intrusion detection using mobile agent in ad-hoc networks, in: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, 26-29 August 2004, vol. 6, pp. 3383-3388.
-
Yan Xia, Ren-Fa Li, Ken-Li Li, Intrusion detection using mobile agent in ad-hoc networks, in: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, 26-29 August 2004, vol. 6, pp. 3383-3388.
-
-
-
-
26
-
-
33745457611
-
-
Yu Liu, Yang Li, Hong Man, MAC layer anomaly detection in ad-hoc networks, in: Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 15-17 June 2005, pp. 402-409, doi:10.1109/IAW.2005.1495980.
-
Yu Liu, Yang Li, Hong Man, MAC layer anomaly detection in ad-hoc networks, in: Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 15-17 June 2005, pp. 402-409, doi:10.1109/IAW.2005.1495980.
-
-
-
-
27
-
-
85177501768
-
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, MA, United States, 2000, pp. 275-283.
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, MA, United States, 2000, pp. 275-283.
-
-
-
-
28
-
-
0038011179
-
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwary, H. Yang, S. Zhou, Specification-based anomaly detection: a new approach for detecting network intrusions, in: Proceedings of the nineth ACM Conference on Computer and Communication Security, 2002, pp. 265-274.
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwary, H. Yang, S. Zhou, Specification-based anomaly detection: a new approach for detecting network intrusions, in: Proceedings of the nineth ACM Conference on Computer and Communication Security, 2002, pp. 265-274.
-
-
-
-
29
-
-
2642547913
-
-
James C. Reynolds, James Just, Larry Clough, Ryan Maglich, On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization, in: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03), 2003.
-
James C. Reynolds, James Just, Larry Clough, Ryan Maglich, On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization, in: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03), 2003.
-
-
-
|