메뉴 건너뛰기




Volumn , Issue , 2009, Pages 112-121

Outlier detection in ad hoc networks using dempster-shafer theory

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIORAL PATTERNS; DEMPSTER-SHAFER THEORY; DETECTION MECHANISM; DISTRIBUTED NODES; FIXED NETWORKS; LIMITED COMMUNICATION; MALICIOUS PEER; MISBEHAVING NODES; MULTIPLE NODES; OUTLIER DETECTION; OUTLIER DETECTION ALGORITHM; SECURITY SCHEME; SIMULATION RESULT; TRAINING DATA; TRAINING DATA SETS;

EID: 70349504836     PISSN: 15516245     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MDM.2009.22     Document Type: Conference Paper
Times cited : (42)

References (41)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • L. Zhou and Z. Haas, "Securing Ad Hoc Networks", IEEE Network, vol. 13, no. 6, 1999, pp. 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 2
    • 0036804761 scopus 로고    scopus 로고
    • Routing Security in Wireless Ad Hoc Networks
    • H. Deng, W. Li, and D. Agrawal, "Routing Security in Wireless Ad Hoc Networks", IEEE Comm. Magazine, vol. 40, no. 10, 2002, pp. 70-75.
    • (2002) IEEE Comm. Magazine , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.3
  • 5
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Pittsburgh, PA, USA, pp
    • A. Perrig, Y.-C. Hu, and D. B. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks", in Proceedings of IEEE Infocom 2003, Pittsburgh, PA, USA, pp. 1976-1986, 2003.
    • (2003) Proceedings of IEEE Infocom , pp. 1976-1986
    • Perrig, A.1    Hu, Y.-C.2    Johnson, D.B.3
  • 6
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Proceedings of the 1st International Workshop on Peer-to-Peer System, Springer-Verlag, pp
    • J. R. Douceur, "The sybil attack", Proceedings of the 1st International Workshop on Peer-to-Peer System, Lecture Notes In Computer Science (vol. 2429), Springer-Verlag, pp. 251 - 260, 2002.
    • (2002) Lecture Notes In Computer Science , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 7
    • 84946031884 scopus 로고
    • Procedures for Detecting Outlying Observations in Samples
    • Feb
    • F. Grubbs, "Procedures for Detecting Outlying Observations in Samples", Technometrics, Vol. 11, No. 1, pp. 1-21, Feb. 1969.
    • (1969) Technometrics , vol.11 , Issue.1 , pp. 1-21
    • Grubbs, F.1
  • 16
    • 17444413786 scopus 로고    scopus 로고
    • An Effective and Efficient Algorithm for High-dimensional Outlier Detection
    • C. Aggarwal and S. Yu, "An Effective and Efficient Algorithm for High-dimensional Outlier Detection", The VLDB Journal, vol. 14, no. 2, pp. 211-221, 2005.
    • (2005) The VLDB Journal , vol.14 , Issue.2 , pp. 211-221
    • Aggarwal, C.1    Yu, S.2
  • 24
    • 4143084830 scopus 로고    scopus 로고
    • SVM-based Intrusion Detection System for Wireless Ad Hoc Networks
    • Orlando, FL, USA
    • H. Deng, Q. Zeng, and D. P. Agrawal, "SVM-based Intrusion Detection System for Wireless Ad Hoc Networks", in Proceedings of the IEEE VTC03, vol. 3, pp. 2147-2151, Orlando, FL, USA, 2003.
    • (2003) Proceedings of the IEEE VTC03 , vol.3 , pp. 2147-2151
    • Deng, H.1    Zeng, Q.2    Agrawal, D.P.3
  • 30
    • 9144231402 scopus 로고    scopus 로고
    • Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
    • Y. Xue and K. Nahrstedt, "Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments", Wireless Personal Communication, vol. 29, issue 3-4, pp. 367-388, 2004.
    • (2004) Wireless Personal Communication , vol.29 , Issue.3-4 , pp. 367-388
    • Xue, Y.1    Nahrstedt, K.2
  • 39
    • 70349508803 scopus 로고    scopus 로고
    • Glomosim 2.03, http://pcl.cs.ucla.edu/projects/glomosim/.
    • Glomosim 2.03, http://pcl.cs.ucla.edu/projects/glomosim/.
  • 40
    • 30144440941 scopus 로고    scopus 로고
    • Dempster-Shafer theory for intrusion detection in ad hoc networks
    • Nov.-Dec
    • T. M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks", IEEE Internet Computing, 9(6):35-41, Nov.-Dec. 2005.
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 35-41
    • Chen, T.M.1    Venkataramanan, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.