-
1
-
-
34547610382
-
Secure routing for mobile ad hoc networks
-
Third Quarter
-
P. Argyroudis and D. O'Mahony, "Secure routing for mobile ad hoc networks," Commun. Surveys Tuts., vol. 7, no. 3, pp. 2-21, Third Quarter, 2005.
-
(2005)
Commun. Surveys Tuts
, vol.7
, Issue.3
, pp. 2-21
-
-
Argyroudis, P.1
O'Mahony, D.2
-
2
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec
-
L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Netw., vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
-
(1999)
IEEE Netw
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
4
-
-
1542287664
-
Secure data transmission in mobile ad hoc networks
-
Sep
-
P. Papadimitratos and Z. Haas, "Secure data transmission in mobile ad hoc networks," in Proc. ACM Workshop WiSE, Sep. 2003, pp. 41-50.
-
(2003)
Proc. ACM Workshop WiSE
, pp. 41-50
-
-
Papadimitratos, P.1
Haas, Z.2
-
5
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Feb
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Commun., vol. 11, no. 1, pp. 48-60, Feb. 2004.
-
(2004)
IEEE Wireless Commun
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
10
-
-
67649826837
-
A network-based anomaly detection system using multiple network features
-
Mar
-
Y. Waizumi, Y. Sato, and Y. Nemoto, "A network-based anomaly detection system using multiple network features," in Proc. 3rd Int. Conf. WEBIST, Mar. 2007, pp. 410-413.
-
(2007)
Proc. 3rd Int. Conf. WEBIST
, pp. 410-413
-
-
Waizumi, Y.1
Sato, Y.2
Nemoto, Y.3
-
12
-
-
58149454270
-
An ideal equation derived for a class of forgetting curves
-
Sep
-
I. London, "An ideal equation derived for a class of forgetting curves," Psychol. Rev., vol. 57, no. 5, pp. 295-302, Sep. 1950.
-
(1950)
Psychol. Rev
, vol.57
, Issue.5
, pp. 295-302
-
-
London, I.1
-
13
-
-
84903836776
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
Jun
-
P. Ning and K. Sun, "How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols," in Proc. 4th Annu. IEEE Inf. Assurance Workshop, Jun. 2003, pp. 60-67.
-
(2003)
Proc. 4th Annu. IEEE Inf. Assurance Workshop
, pp. 60-67
-
-
Ning, P.1
Sun, K.2
-
14
-
-
70450243327
-
On vulnerability and protection of ad hoc on-demand distance vector protocol
-
Feb
-
W. Wang, Y. Lu, and B. Bhargava, "On vulnerability and protection of ad hoc on-demand distance vector protocol," in Proc. 10th ICT, Feb. 2003, pp. 375-382.
-
(2003)
Proc. 10th ICT
, pp. 375-382
-
-
Wang, W.1
Lu, Y.2
Bhargava, B.3
-
15
-
-
4143078294
-
On the effect of node misbehavior in ad hoc networks
-
Jun
-
M. Hollick, J. Schmitt, C. Seipl, and R. Steinmetz, "On the effect of node misbehavior in ad hoc networks," in Proc. IEEE Global Telecommun. Conf. GLOBECOM, Jun. 2004, pp. 3759-3763.
-
(2004)
Proc. IEEE Global Telecommun. Conf. GLOBECOM
, pp. 3759-3763
-
-
Hollick, M.1
Schmitt, J.2
Seipl, C.3
Steinmetz, R.4
-
19
-
-
66449105100
-
-
Homepage, Online, Available
-
A-SAODV Homepage. [Online]. Available: http://saodv.cefriel.it/
-
A-SAODV
-
-
-
20
-
-
85008034383
-
Securing AODV: The A-SAODV secure routing prototype
-
Feb
-
D. Cerri and A. Ghioni, "Securing AODV: The A-SAODV secure routing prototype," IEEE Commun. Mag., vol. 46, no. 2, pp. 120-125, Feb. 2008.
-
(2008)
IEEE Commun. Mag
, vol.46
, Issue.2
, pp. 120-125
-
-
Cerri, D.1
Ghioni, A.2
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
23
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May/Jun
-
H. Yih-Chun and A. Perrig, "A survey of secure wireless ad hoc routing," IEEE Security Privacy, vol. 2, no. 3, pp. 28-39, May/Jun. 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Yih-Chun, H.1
Perrig, A.2
-
24
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Jan
-
H. Yih-Chun, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol. 11, no. 1/2, pp. 21-38, Jan. 2005.
-
(2005)
Wirel. Netw
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Yih-Chun, H.1
Perrig, A.2
Johnson, D.3
-
25
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Jul
-
H. Yih-Chun, D. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Netw., vol. 1, no. 1, pp. 175-192, Jul. 2003.
-
(2003)
Ad Hoc Netw
, vol.1
, Issue.1
, pp. 175-192
-
-
Yih-Chun, H.1
Johnson, D.2
Perrig, A.3
-
26
-
-
8344229909
-
A clusterbased security architecture for ad hoc networks
-
Mar
-
M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, and L. Wolf, "A clusterbased security architecture for ad hoc networks," in Proc. 23rd Annu. Joint Conf. IEEE Comput. Commun. Soc. INFOCOM, Mar. 2004, pp. 2393-2403.
-
(2004)
Proc. 23rd Annu. Joint Conf. IEEE Comput. Commun. Soc. INFOCOM
, pp. 2393-2403
-
-
Bechler, M.1
Hof, H.-J.2
Kraft, D.3
Pahlke, F.4
Wolf, L.5
-
27
-
-
15244360279
-
An efficient key predistribution scheme for ad hoc network security
-
Mar
-
M. Ramkumar and N. Memon, "An efficient key predistribution scheme for ad hoc network security," IEEE J. Sel. Areas Commun., vol. 23, no. 3, pp. 611-621, Mar. 2005.
-
(2005)
IEEE J. Sel. Areas Commun
, vol.23
, Issue.3
, pp. 611-621
-
-
Ramkumar, M.1
Memon, N.2
-
28
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
Mar
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "Authenticated routing for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 23, no. 3, pp. 598-610, Mar. 2005.
-
(2005)
IEEE J. Sel. Areas Commun
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
LaFlamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
29
-
-
0036804761
-
Routing security in ad hoc networks
-
Oct
-
H. Deng, W. Li, and D. Agrawal, "Routing security in ad hoc networks," IEEE Commun. Mag., vol. 40, no. 10, pp. 70-75, Oct. 2002.
-
(2002)
IEEE Commun. Mag
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.3
-
30
-
-
84954526194
-
Robust routing in wireless ad hoc networks
-
Aug
-
S. Lee, B. Han, and M. Shin, "Robust routing in wireless ad hoc networks," in Proc. 31st ICPP Workshops, Aug. 2002, pp. 73-78.
-
(2002)
Proc. 31st ICPP Workshops
, pp. 73-78
-
-
Lee, S.1
Han, B.2
Shin, M.3
-
31
-
-
84969513597
-
Effective intrusion detection using multiple sensors in wireless ad hoc networks
-
Jan
-
O. Kachirski and R. Guha, "Effective intrusion detection using multiple sensors in wireless ad hoc networks," in Proc. 36th Annu. HICSS, Jan. 2003, pp. 57-64.
-
(2003)
Proc. 36th Annu. HICSS
, pp. 57-64
-
-
Kachirski, O.1
Guha, R.2
-
32
-
-
21644441634
-
An intrusion detection tool for AODV-based ad hoc wireless networks
-
Dec
-
G. Vigna, S. Gwalani, K. Srinivasan, E. Belding-Royer, and R. Kemmerer, "An intrusion detection tool for AODV-based ad hoc wireless networks," in Proc. 20th ACSAC, Dec. 2004, pp. 16-27.
-
(2004)
Proc. 20th ACSAC
, pp. 16-27
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.4
Kemmerer, R.5
-
33
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
Oct
-
C. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A specification-based intrusion detection system for AODV," in Proc. 1st ACM Workshop SASN, Oct. 2003, pp. 125-134.
-
(2003)
Proc. 1st ACM Workshop SASN
, pp. 125-134
-
-
Tseng, C.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
34
-
-
0037629724
-
Cross-feature analysis for detecting ad-hoc routing anomalies
-
May
-
Y. Huang, W. Fan, W. Lee, and P. Yu, "Cross-feature analysis for detecting ad-hoc routing anomalies," in Proc. 23rd ICDCS, May 2003, pp. 478-487.
-
(2003)
Proc. 23rd ICDCS
, pp. 478-487
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.4
-
35
-
-
34548323745
-
Attack analysis and detection for ad hoc routing protocols
-
Sep
-
Y. Huang and W. Lee, "Attack analysis and detection for ad hoc routing protocols," in Proc. 7th Int. Symp. RAID, Sep. 2004, pp. 125-145.
-
(2004)
Proc. 7th Int. Symp. RAID
, pp. 125-145
-
-
Huang, Y.1
Lee, W.2
-
36
-
-
18144421528
-
Towards adaptive intrusion detection in mobile ad hoc networks
-
Nov./Dec
-
B. Sun, K. Wu, and U. Pooch, "Towards adaptive intrusion detection in mobile ad hoc networks," in Proc. IEEE Global Telecommun. Conf. GLOBECOM, Nov./Dec. 2004, pp. 3551-3555.
-
(2004)
Proc. IEEE Global Telecommun. Conf. GLOBECOM
, pp. 3551-3555
-
-
Sun, B.1
Wu, K.2
Pooch, U.3
-
38
-
-
0142168536
-
Impact of mobility metric on routing protocols for mobile ad hoc networks
-
Aug
-
J. Tsumochi, K. Masayama, H. Uehara, and M. Yokoyama, "Impact of mobility metric on routing protocols for mobile ad hoc networks," in Proc. IEEE Pacific Rim Conf. Commun., Comput. Signal Process. PACRIM, Aug. 2003, pp. 322-325.
-
(2003)
Proc. IEEE Pacific Rim Conf. Commun., Comput. Signal Process. PACRIM
, pp. 322-325
-
-
Tsumochi, J.1
Masayama, K.2
Uehara, H.3
Yokoyama, M.4
-
39
-
-
0032667063
-
The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks
-
Aug
-
D. Maltz, J. Broch, J. Jetcheva, and D. Johnson, "The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks," IEEE J. Sel. Areas Commun., vol. 17, no. 8, pp. 1439-1453, Aug. 1999.
-
(1999)
IEEE J. Sel. Areas Commun
, vol.17
, Issue.8
, pp. 1439-1453
-
-
Maltz, D.1
Broch, J.2
Jetcheva, J.3
Johnson, D.4
-
40
-
-
0035249889
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
Feb
-
C. Perkins, E. Royer, S. Das, and M. Marina, "Performance comparison of two on-demand routing protocols for ad hoc networks," IEEE Pers. Commun., vol. 8, no. 1, pp. 16-28, Feb. 2001.
-
(2001)
IEEE Pers. Commun
, vol.8
, Issue.1
, pp. 16-28
-
-
Perkins, C.1
Royer, E.2
Das, S.3
Marina, M.4
-
41
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
Sep
-
T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wirel. Commun. Mob. Comput., vol. 2, no. 5, pp. 483-502, Sep. 2002.
-
(2002)
Wirel. Commun. Mob. Comput
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
44
-
-
33747210407
-
Description logics for an autonomic ids event analysis system
-
Sep
-
W. Yan, E. Hou, and N. Ansari, "Description logics for an autonomic ids event analysis system," Comput. Commun., vol. 29, no. 15, pp. 2841-2852, Sep. 2006.
-
(2006)
Comput. Commun
, vol.29
, Issue.15
, pp. 2841-2852
-
-
Yan, W.1
Hou, E.2
Ansari, N.3
-
45
-
-
24144468632
-
Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks
-
May
-
W. Yan, E. Hou, and N. Ansari, "Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks," in Proc. IEEE ICC, May 2005, pp. 1512-1517.
-
(2005)
Proc. IEEE ICC
, pp. 1512-1517
-
-
Yan, W.1
Hou, E.2
Ansari, N.3
|