-
1
-
-
18844454790
-
Intrusion detection in sensor networks: a non-cooperative game approach
-
August–September
-
Agah, A., Das, S.K., Basu, K. and Asadi, M. (2004) ‘Intrusion detection in sensor networks: a non-cooperative game approach’, Proceedings of Third IEEE International Symposium on Network Computing and Applications (NCA’04), August–September, pp.343–346.
-
(2004)
Proceedings of Third IEEE International Symposium on Network Computing and Applications (NCA’04)
, pp. 343-346
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
Asadi, M.4
-
2
-
-
1542288809
-
A game theoretic approach to decision and analysis in network intrusion detection
-
December
-
Alpcan, T. and Basar, T. (2003) ‘A game theoretic approach to decision and analysis in network intrusion detection’, Proceedings of 42nd IEEE Conference on Decision and Control (CDC), December, Vol. 3, pp.2595–2600.
-
(2003)
Proceedings of 42nd IEEE Conference on Decision and Control (CDC)
, vol.3
, pp. 2595-2600
-
-
Alpcan, T.1
Basar, T.2
-
3
-
-
14344257107
-
A game theoretic analysis of intrusion detection in access control systems
-
December
-
Alpcan, T. and Basar, T. (2004) ‘A game theoretic analysis of intrusion detection in access control systems’, Proceedings of 43rd IEEE Conference on Decision and Control (CDC), December, Vol. 2, pp.1568–1573.
-
(2004)
Proceedings of 43rd IEEE Conference on Decision and Control (CDC)
, vol.2
, pp. 1568-1573
-
-
Alpcan, T.1
Basar, T.2
-
4
-
-
0003964874
-
Next-generation intrusion detection expert system (NIDES): a summary
-
Anderson, D., Frivold, T. and Valdes, A. (1995) ‘Next-generation intrusion detection expert system (NIDES): a summary’, Computer Science Laboratory SRI-CSL-95-07, May.
-
(1995)
Computer Science Laboratory SRI-CSL-95-07
, vol.May
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
5
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Broch, J., Maltz, D., Johnson, D., Hu, Y-C. and Jetcheva, J. (1998) ‘A performance comparison of multi-hop wireless ad hoc network routing protocols’, Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’98), October, pp.85–97.
-
(1998)
Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’98)
, vol.October
, pp. 85-97
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.-C.4
Jetcheva, J.5
-
7
-
-
4143084830
-
SVM-based intrusion detection sysem for wireless ad hoc networks
-
October
-
Deng, H., Zeng, Q. and Agrawal, D.P. (2003) ‘SVM-based intrusion detection sysem for wireless ad hoc networks’, Proceedings of 58th IEEE Vehicular Technology Conference (VTC’03), October, Vol. 3, pp.2147–2151.
-
(2003)
Proceedings of 58th IEEE Vehicular Technology Conference (VTC’03)
, vol.3
, pp. 2147-2151
-
-
Deng, H.1
Zeng, Q.2
Agrawal, D.P.3
-
9
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May–June
-
Hu, Y-C. and Perrig, A. (2004) ‘A survey of secure wireless ad hoc routing’, IEEE Security and Privacy Magazine, May–June, Vol. 2, No. 3, pp.28–39.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.-C.1
Perrig, A.2
-
11
-
-
0037629724
-
Cross-feature analysis for detecting ad-hoc routing anomalies
-
May
-
Huang, Y., Fan, W., Lee, W. and Yu, P.S. (2003) ‘Cross-feature analysis for detecting ad-hoc routing anomalies’, Proceedings of 23th International Conference on Distributed Computing Systems (ICDCS), May, pp.478–487.
-
(2003)
Proceedings of 23th International Conference on Distributed Computing Systems (ICDCS)
, pp. 478-487
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.S.4
-
13
-
-
0042474230
-
Detecting network intrusions via sampling: a game theoretic approach
-
March–April
-
Kodialam, M. and Lakshman, T.V. (2003) ‘Detecting network intrusions via sampling: a game theoretic approach’, IEEE INFOCOM 2003, March–April, Vol. 3, pp.1880–1889.
-
(2003)
IEEE INFOCOM 2003
, vol.3
, pp. 1880-1889
-
-
Kodialam, M.1
Lakshman, T.V.2
-
14
-
-
84885774862
-
Adaptive intrusion detection: a data mining approach
-
November
-
Lee, W. and Stolfo, S.J. (2000) ‘Adaptive intrusion detection: a data mining approach’, ACM Transactions on Information and System Security (TISSEC), November, Vol. 3, No. 4, pp.227–261.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
15
-
-
0036095845
-
-
November
-
Li, Y., Wu, N., Wang, X.S. and Jajodia, S. (2002) ‘Enhancing profiles for anomaly detection using time granularities’, Journal of Computer Security, November, Vol. 10, pp.137–157.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 137-157
-
-
Li, Y.1
Wu, N.2
Wang, X.S.3
Jajodia, S.4
-
17
-
-
33847315660
-
Short paper: a distributed cross-layer intrusion detection system for ad hoc networks
-
September
-
Liu, Y., Li, Y. and Man, H. (2005a) ‘Short paper: a distributed cross-layer intrusion detection system for ad hoc networks’, Proceedings of IEEE/CreateNet the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), September, pp.418–420.
-
(2005)
Proceedings of IEEE/CreateNet the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005)
, pp. 418-420
-
-
Liu, Y.1
Li, Y.2
Man, H.3
-
18
-
-
33745457611
-
MAC layer anomaly detection in ad hoc networks
-
June
-
Liu, Y., Li, Y. and Man, H. (2005b) ‘MAC layer anomaly detection in ad hoc networks’, Proceedings of Sixth IEEE SMC Information Assurance Workshop, June, pp.402–409.
-
(2005)
Proceedings of Sixth IEEE SMC Information Assurance Workshop
, pp. 402-409
-
-
Liu, Y.1
Li, Y.2
Man, H.3
-
19
-
-
33745225594
-
A distributed cross-layer intrusion detection system for ad hoc networks
-
Liu, Y., Li, Y. and Man, H. (2006a) ‘A distributed cross-layer intrusion detection system for ad hoc networks’, Annals of Telecommunications, Hermes-Lavoisier, to appear.
-
(2006)
Annals of Telecommunications, Hermes-Lavoisier, to appear
-
-
Liu, Y.1
Li, Y.2
Man, H.3
-
20
-
-
84952971268
-
A hybrid data mining anomaly detection technique in ad hoc networks
-
Inderscience Publishers, to appear
-
Liu, Y., Li, Y., Man, H. and Jiang, H. (2006b) ‘A hybrid data mining anomaly detection technique in ad hoc networks’, International Journal of Wireless and Mobile Computing (IJWMC): Special Issue on Security of Computer Network and Mobile Systems, Inderscience Publishers, to appear.
-
(2006)
International Journal of Wireless and Mobile Computing (IJWMC): Special Issue on Security of Computer Network and Mobile Systems
-
-
Liu, Y.1
Li, Y.2
Man, H.3
Jiang, H.4
-
24
-
-
17144395121
-
An analytical approach to the study of cooperation in wireless ad hoc networks
-
March
-
Srinivasan, V., Nuggehalli, V., Chiasserini, C-F. and Rao, R.R. (2005) ‘An analytical approach to the study of cooperation in wireless ad hoc networks’, IEEE Transactions on Communications, March, Vol. 4, No. 2, pp.722–733.
-
(2005)
IEEE Transactions on Communications
, vol.4
, Issue.2
, pp. 722-733
-
-
Srinivasan, V.1
Nuggehalli, V.2
Chiasserini, C.-F.3
Rao, R.R.4
-
25
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
October
-
Tseng, C., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J. and Levitt, K. (2003) ‘A specification-based intrusion detection system for AODV’, Proceedings of First ACM Workshop on Security of Ad Hoc and Sensor Networks, October, pp.125–134.
-
(2003)
Proceedings of First ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 125-134
-
-
Tseng, C.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
26
-
-
11244285854
-
Modelling cooperation in mobile ad hoc networks: a formal description of selfishness
-
March
-
Urpi, A., Bonuccelli, M. and Giordano, S. (2003) ‘Modelling cooperation in mobile ad hoc networks: a formal description of selfishness’, WiOpt’03 Workshop: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March.
-
(2003)
WiOpt’03 Workshop: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks
-
-
Urpi, A.1
Bonuccelli, M.2
Giordano, S.3
-
27
-
-
17744372911
-
Game theory models for IEEE 802.11 DCF in wireless ad hoc networks
-
March
-
Xiao, Y., Shan, X. and Ren, Y. (2005) ‘Game theory models for IEEE 802.11 DCF in wireless ad hoc networks’, IEEE Radio Communications, March, Vol. 43, No. 3, pp.S22–S26.
-
(2005)
IEEE Radio Communications
, vol.43
, Issue.3
, pp. S22-S26
-
-
Xiao, Y.1
Shan, X.2
Ren, Y.3
|