-
1
-
-
70349145019
-
-
Bonnmotion: A mobility scenario generation and analysis tool
-
Bonnmotion: A mobility scenario generation and analysis tool.
-
-
-
-
2
-
-
70349091517
-
-
Iibge: A C++ library for grammatical evolution.
-
Iibge: A C++ library for grammatical evolution.
-
-
-
-
3
-
-
70349141877
-
-
Ns-2: The network simulator.
-
Ns-2: The network simulator.
-
-
-
-
7
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
IEEE Computer Society, January
-
S. Buchegger and J.-Y. L. Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In 10th Euromicro Workshop on Parallel, Distributed and Network-based, Processing Proceedings, pages 403-410. IEEE Computer Society, January 2002.
-
(2002)
10th Euromicro Workshop on Parallel, Distributed and Network-based, Processing Proceedings
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
8
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
T. Camp, J. Boleng, and V. Davies. A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, 2:483-502, 2002.
-
(2002)
Wireless Communications and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications
, vol.2
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
11
-
-
12744258854
-
Case-based agents for packet-level intrusion detection in ad hoc networks
-
R. Guha, O. Kachirski, D. Schwartz, S. Stoecklin, and E. Yilmaz. Case-based agents for packet-level intrusion detection in ad hoc networks. In Proceedings of the 17th International Symposium on Computer and Information Sciences, 2002.
-
(2002)
Proceedings of the 17th International Symposium on Computer and Information Sciences
-
-
Guha, R.1
Kachirski, O.2
Schwartz, D.3
Stoecklin, S.4
Yilmaz, E.5
-
12
-
-
4544258840
-
-
Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In In Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
-
Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In In Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
-
-
-
-
13
-
-
2442417706
-
-
J. P. A. J. J. Parker, J. Undercoffer. On intrusion detection and response for mobile ad hoc networks. In 23th IEEE Int. Performance Computing and Communications Conference Proceedings, 2004.
-
J. P. A. J. J. Parker, J. Undercoffer. On intrusion detection and response for mobile ad hoc networks. In 23th IEEE Int. Performance Computing and Communications Conference Proceedings, 2004.
-
-
-
-
15
-
-
70349148309
-
-
Y. Lu, Y. Zhong, and B. Bhargava. Packet loss in mobile ad hoc networks. TR 03-009, Dept. of Computer Science, Purdue University, April.
-
Y. Lu, Y. Zhong, and B. Bhargava. Packet loss in mobile ad hoc networks. TR 03-009, Dept. of Computer Science, Purdue University, April.
-
-
-
-
16
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Proc. of ACM Int, MOBICOM
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In In Proc. of ACM Int. Conf. on Mobile Computing and Networking (MOBICOM), pages 255-265, 2000.
-
(2000)
Conf. on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
18
-
-
33745794758
-
An approach to implement a network intrusion detection system using genetic algorithms
-
M. Pillai, J. Eloff, and H. Venter. An approach to implement a network intrusion detection system using genetic algorithms. In SAISCIT Proceedings, pages 221-228, 2004.
-
(2004)
SAISCIT Proceedings
, pp. 221-228
-
-
Pillai, M.1
Eloff, J.2
Venter, H.3
-
19
-
-
84958950397
-
Grammatical evolution: Evolving programs for an arbitrary language
-
1st European Workshop on Genetic Programming Proceedings, Springer
-
C. Ryan, J. Colline, and M. O'Neill. Grammatical evolution: Evolving programs for an arbitrary language. In 1st European Workshop on Genetic Programming Proceedings, LNCS 1391, pages 83-95. Springer, 1998.
-
(1998)
LNCS
, vol.1391
, pp. 83-95
-
-
Ryan, C.1
Colline, J.2
O'Neill, M.3
-
20
-
-
59349102011
-
Evolving intrusion detection rules on mobile ad hoc networks
-
Proceedings of the PRICAI, Springer
-
S. Sen and J. A. Clark. Evolving intrusion detection rules on mobile ad hoc networks. In Proceedings of the PRICAI, LNAI 5351, pages 1053-1058. Springer, 2008.
-
(2008)
LNAI
, vol.5351
, pp. 1053-1058
-
-
Sen, S.1
Clark, J.A.2
-
22
-
-
85005954407
-
-
B. Sun, K. Wu, and U. Pooch. Zone-based intrusion detection for mobile ad hoc networks. Int. Journal of Ad Hoc and Sensor Wireless Networks, 2(3), 2003.
-
B. Sun, K. Wu, and U. Pooch. Zone-based intrusion detection for mobile ad hoc networks. Int. Journal of Ad Hoc and Sensor Wireless Networks, 2(3), 2003.
-
-
-
-
23
-
-
33750370441
-
-
C. Tseng, S.-H. Wang, W. Lee, C. Ko, and K. Lewitt. Demem: Distributed evidence driven message exchange intrusion detection model for manet. In In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID'06), pages 249-271. Springer, 2006.
-
C. Tseng, S.-H. Wang, W. Lee, C. Ko, and K. Lewitt. Demem: Distributed evidence driven message exchange intrusion detection model for manet. In In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID'06), pages 249-271. Springer, 2006.
-
-
-
-
24
-
-
4544342574
-
-
C.-Y. Tseng, P. Balasubramayan, C. Ko, R. Limprasittiporn, J. Rowe, and K. Lewitt. A specification-based intrusion detection system for aodv. In In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN), 2003.
-
C.-Y. Tseng, P. Balasubramayan, C. Ko, R. Limprasittiporn, J. Rowe, and K. Lewitt. A specification-based intrusion detection system for aodv. In In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN), 2003.
-
-
-
-
25
-
-
21644441634
-
An intrusion detection tool for aodv-based ad hoc wireless networks
-
Washington, DC, USA, IEEE Computer Society
-
G. Vigna, S. Gwalani, K. Srinivasan, E. M. Belding-Royer, and R. A. Kemmerer. An intrusion detection tool for aodv-based ad hoc wireless networks. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04), pages 16-27, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04)
, pp. 16-27
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.M.4
Kemmerer, R.A.5
-
26
-
-
33847739307
-
Knowledge extraction from kdd'99 intrusion data using grammatical evolution
-
February
-
D. Wilson and D. Kaur. Knowledge extraction from kdd'99 intrusion data using grammatical evolution. WSEAS Transactions on Information Science and Applications, 4:237-244, February 2007.
-
(2007)
WSEAS Transactions on Information Science and Applications
, vol.4
, pp. 237-244
-
-
Wilson, D.1
Kaur, D.2
-
27
-
-
26844476455
-
Applying genetic programming to evolve learned rules for network anomaly detection
-
ICNC Proceedings, Springer
-
C. Yin, S. Tian, H. Huang, and J. He. Applying genetic programming to evolve learned rules for network anomaly detection. In ICNC Proceedings, LNCS 3612, pages 323-331. Springer, 2005.
-
(2005)
LNCS
, vol.3612
, pp. 323-331
-
-
Yin, C.1
Tian, S.2
Huang, H.3
He, J.4
|