-
1
-
-
0033357103
-
Securing Ad Hoc Networks
-
L. Zhou and Z. Haas, "Securing Ad Hoc Networks", IEEE Network, vol. 13, no. 6, 1999, pp. 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
2
-
-
0036804761
-
Routing Security in Wireless Ad Hoc Networks
-
H. Deng, W. Li, and D. Agrawal, "Routing Security in Wireless Ad Hoc Networks", IEEE Comm. Magazine, vol. 40, no. 10, 2002, pp. 70-75.
-
(2002)
IEEE Comm. Magazine
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.3
-
3
-
-
0036957315
-
Ariadne: A Secure ondemand routing protocol for ad hoc networks
-
Atlanta, GA, USA, pp
-
Y. Hu, A. Perrig and D. Johnson, "Ariadne: A Secure ondemand routing protocol for ad hoc networks", in Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom), Atlanta, GA, USA, pp. 12-23, 2002.
-
(2002)
Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom)
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
4
-
-
51849165425
-
Detecting blackhole attack in mobile ad hoc networks
-
Glasgow, Scotland, UK, pp
-
th European Personal Mobile Communications Conference , Glasgow, Scotland, UK, pp. 490 - 495, 2003.
-
(2003)
th European Personal Mobile Communications Conference
, pp. 490-495
-
-
Sun, B.1
Guan, Y.2
Chen, J.3
Pooch, U.W.4
-
5
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Pittsburgh, PA, USA, pp
-
A. Perrig, Y.-C. Hu, and D. B. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks", in Proceedings of IEEE Infocom 2003, Pittsburgh, PA, USA, pp. 1976-1986, 2003.
-
(2003)
Proceedings of IEEE Infocom
, pp. 1976-1986
-
-
Perrig, A.1
Hu, Y.-C.2
Johnson, D.B.3
-
6
-
-
84947273682
-
The sybil attack
-
Proceedings of the 1st International Workshop on Peer-to-Peer System, Springer-Verlag, pp
-
J. R. Douceur, "The sybil attack", Proceedings of the 1st International Workshop on Peer-to-Peer System, Lecture Notes In Computer Science (vol. 2429), Springer-Verlag, pp. 251 - 260, 2002.
-
(2002)
Lecture Notes In Computer Science
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
7
-
-
84946031884
-
Procedures for Detecting Outlying Observations in Samples
-
Feb
-
F. Grubbs, "Procedures for Detecting Outlying Observations in Samples", Technometrics, Vol. 11, No. 1, pp. 1-21, Feb. 1969.
-
(1969)
Technometrics
, vol.11
, Issue.1
, pp. 1-21
-
-
Grubbs, F.1
-
9
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Boston, MA, USA, pp
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00), Boston, MA, USA, pp. 255-265, 2000.
-
(2000)
Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
10
-
-
0034546898
-
Intrusion Detection in Wireless Adhoc Networks
-
Boston, MA, USA, pp
-
Y. Zhang and W. Lee, "Intrusion Detection in Wireless Adhoc Networks", in Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00), Boston, MA, USA, pp. 275-283, 2000.
-
(2000)
Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00)
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
11
-
-
4544258840
-
A Cooperative Intrusion Detection System for Ad Hoc Networks
-
Fairfax, VA, USA, pp
-
Y. Huang and W. Lee, "A Cooperative Intrusion Detection System for Ad Hoc Networks", in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03), Fairfax, VA, USA, pp. 135-147, 2003.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03)
, pp. 135-147
-
-
Huang, Y.1
Lee, W.2
-
12
-
-
33749048728
-
Cross-layer Analysis for Detecting Wireless Misbehavior
-
Las Vegas, Nevada, USA, pp, Jan
-
J. Parker, A. Patwardhan and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehavior", in Proceedings of the IEEE Consumer Communications and Networking Conference(CCNC 2006), Las Vegas, Nevada, USA, pp. 6-9, Jan. 2006.
-
(2006)
Proceedings of the IEEE Consumer Communications and Networking Conference(CCNC 2006)
, pp. 6-9
-
-
Parker, J.1
Patwardhan, A.2
Joshi, A.3
-
13
-
-
0039845384
-
Efficient Algorithms for Mining Outliers from Large Datasets
-
Dallas, Texas, USA, pp
-
S. Ramaswamy, R. Rastogi, and K. Shim, "Efficient Algorithms for Mining Outliers from Large Datasets", in Proceedings of the 2000 ACM SIGMOD international Conference on Management of Data, Dallas, Texas, USA, pp. 427-438, 2000.
-
(2000)
Proceedings of the 2000 ACM SIGMOD international Conference on Management of Data
, pp. 427-438
-
-
Ramaswamy, S.1
Rastogi, R.2
Shim, K.3
-
14
-
-
0012905555
-
Finding Intensional Knowledge of Distance-Based Outliers
-
Edinburgh, Scotland, UK, pp
-
thinternational Conference on Very Large Data Bases (VLDB99), Edinburgh, Scotland, UK, pp. 211-222, 1999.
-
(1999)
thinternational Conference on Very Large Data Bases (VLDB99)
, pp. 211-222
-
-
Knorr, E.M.1
Ng, R.T.2
-
15
-
-
77952380096
-
Mining Distance-based Outliers in Near Linear Time with Randomization and a Simple Pruning Rule
-
Washington, D.C, USA, pp
-
S. D. Bay and M. Schwabacher, "Mining Distance-based Outliers in Near Linear Time with Randomization and a Simple Pruning Rule", in Proceedings of the Ninth ACM SIGKDD international Conference on Knowledge Discovery and Data Mining (KDD03), Washington, D.C., USA, pp. 29-38, 2003.
-
(2003)
Proceedings of the Ninth ACM SIGKDD international Conference on Knowledge Discovery and Data Mining (KDD03)
, pp. 29-38
-
-
Bay, S.D.1
Schwabacher, M.2
-
16
-
-
17444413786
-
An Effective and Efficient Algorithm for High-dimensional Outlier Detection
-
C. Aggarwal and S. Yu, "An Effective and Efficient Algorithm for High-dimensional Outlier Detection", The VLDB Journal, vol. 14, no. 2, pp. 211-221, 2005.
-
(2005)
The VLDB Journal
, vol.14
, Issue.2
, pp. 211-221
-
-
Aggarwal, C.1
Yu, S.2
-
17
-
-
0034832620
-
Outlier Detection for High Dimensional Data
-
Santa Barbara, California, USA, pp
-
C. Aggarwal and S. Yu, "Outlier Detection for High Dimensional Data", in Proceedings of the 2001 ACM SIGMOD international Conference on Management of Data (SIGMOD01), Santa Barbara, California, USA, pp. 37-46, 2001.
-
(2001)
Proceedings of the 2001 ACM SIGMOD international Conference on Management of Data (SIGMOD01)
, pp. 37-46
-
-
Aggarwal, C.1
Yu, S.2
-
18
-
-
32344440279
-
Feature Bagging for Outlier Detection
-
Chicago, Illinois, USA, pp
-
A. Lazarevic and V. Kumar, "Feature Bagging for Outlier Detection", in Proceeding of the Eleventh ACM SIGKDD international Conference on Knowledge Discovery in Data Mining (KDD05), Chicago, Illinois, USA , pp. 157-166, 2005.
-
(2005)
Proceeding of the Eleventh ACM SIGKDD international Conference on Knowledge Discovery in Data Mining (KDD05)
, pp. 157-166
-
-
Lazarevic, A.1
Kumar, V.2
-
19
-
-
37849053357
-
Outlier Detection in Sensor Networks
-
Montreal, Quebec, Canada, pp
-
B. Sheng, Q. Li, W. Mao and W. Jin, "Outlier Detection in Sensor Networks", in Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc07), Montreal, Quebec, Canada, pp. 219 - 228, 2007.
-
(2007)
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc07)
, pp. 219-228
-
-
Sheng, B.1
Li, Q.2
Mao, W.3
Jin, W.4
-
20
-
-
14344259796
-
Distributed Deviation Detection in Sensor Networks
-
T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, "Distributed Deviation Detection in Sensor Networks", ACM SIGMOD Record, vol. 32, issue. 4, pp. 77-82, 2003.
-
(2003)
ACM SIGMOD Record
, vol.32
, Issue.4
, pp. 77-82
-
-
Palpanas, T.1
Papadopoulos, D.2
Kalogeraki, V.3
Gunopulos, D.4
-
21
-
-
35248830261
-
Online Outlier Detection in Sensor Data Using Non-parametric Models
-
Seoul, Korea, pp
-
ndinternational Conference on Very Large Data Bases (VLDB06), Seoul, Korea, pp. 187-198, 2006.
-
(2006)
ndinternational Conference on Very Large Data Bases (VLDB06)
, pp. 187-198
-
-
Subramaniam, S.1
Palpanas, T.2
Papadopoulos, D.3
Kalogeraki, V.4
Gunopulos, D.5
-
22
-
-
33947612062
-
In-network Outlier Detection in Wireless Sensor Networks
-
Lisbon, Portugal
-
J. Branch, B. Szymanski, C. Giannella, R. Wolff, and H. Kargupta, "In-network Outlier Detection in Wireless Sensor Networks", in Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS2006), Lisbon, Portugal, 2006.
-
(2006)
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS2006)
-
-
Branch, J.1
Szymanski, B.2
Giannella, C.3
Wolff, R.4
Kargupta, H.5
-
24
-
-
4143084830
-
SVM-based Intrusion Detection System for Wireless Ad Hoc Networks
-
Orlando, FL, USA
-
H. Deng, Q. Zeng, and D. P. Agrawal, "SVM-based Intrusion Detection System for Wireless Ad Hoc Networks", in Proceedings of the IEEE VTC03, vol. 3, pp. 2147-2151, Orlando, FL, USA, 2003.
-
(2003)
Proceedings of the IEEE VTC03
, vol.3
, pp. 2147-2151
-
-
Deng, H.1
Zeng, Q.2
Agrawal, D.P.3
-
25
-
-
84950162203
-
Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
-
Kyoto, Japan
-
O.Kachirski and R. Guha, "Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks", in Proceedings of the IEEE Workshop on Knowledge Media Networking, pp. 153-158, Kyoto, Japan, 2002.
-
(2002)
Proceedings of the IEEE Workshop on Knowledge Media Networking
, pp. 153-158
-
-
Kachirski, O.1
Guha, R.2
-
26
-
-
4544342574
-
A Specification-based Intrusion Detection System for AODV
-
Fairfax, VA, USA, pp
-
C. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A Specification-based Intrusion Detection System for AODV", in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks(SASN03), Fairfax, VA, USA, pp. 125-134, 2003.
-
(2003)
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks(SASN03)
, pp. 125-134
-
-
Tseng, C.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
27
-
-
4544258840
-
A Cooperative Intrusion Detection System for Ad Hoc Networks
-
Fairfax, VA, USA, pp
-
Y. Huang and W. Lee, "A Cooperative Intrusion Detection System for Ad Hoc Networks", in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03), Fairfax, VA, USA, pp. 135-147, 2003.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03)
, pp. 135-147
-
-
Huang, Y.1
Lee, W.2
-
28
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Boston, MA, USA, pp
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00), Boston, MA, USA, pp. 255-265, 2000.
-
(2000)
Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
29
-
-
34547461705
-
Misbehavior Resilient Multi-path Data Transmission in Mobile Ad-hoc Networks
-
Alexandria, VA, USA, pp
-
M. Kefayati, H. R. Rabiee, S. G. Miremadi, and A. Khonsari, "Misbehavior Resilient Multi-path Data Transmission in Mobile Ad-hoc Networks", in Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06), Alexandria, VA, USA, pp. 91-100, 2006.
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06)
, pp. 91-100
-
-
Kefayati, M.1
Rabiee, H.R.2
Miremadi, S.G.3
Khonsari, A.4
-
30
-
-
9144231402
-
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
-
Y. Xue and K. Nahrstedt, "Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments", Wireless Personal Communication, vol. 29, issue 3-4, pp. 367-388, 2004.
-
(2004)
Wireless Personal Communication
, vol.29
, Issue.3-4
, pp. 367-388
-
-
Xue, Y.1
Nahrstedt, K.2
-
31
-
-
1542299118
-
Ad hoc-VCG: A Truthful and Cost-efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents
-
San Diego, CA, USA, pp
-
L. Anderegg and S. Eidenbenz, "Ad hoc-VCG: A Truthful and Cost-efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents", in Proceedings of the 9th Annual international Conference on Mobile Computing and Networking (MOBICOM03), San Diego, CA, USA, pp. 245-259, 2003.
-
(2003)
Proceedings of the 9th Annual international Conference on Mobile Computing and Networking (MOBICOM03)
, pp. 245-259
-
-
Anderegg, L.1
Eidenbenz, S.2
-
32
-
-
70349498355
-
Security through Collaboration in MANETs
-
Orlando, FL, USA, Nov
-
W. Li, J. Parker and A. Joshi, "Security through Collaboration in MANETs", in Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), Orlando, FL, USA, Nov 2008.
-
(2008)
Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)
-
-
Li, W.1
Parker, J.2
Joshi, A.3
-
33
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
Lausanne, Switzerland, pp, Jun
-
S. Buchegger, J. Le Boudec, "Performance analysis of the CONFIDANT protocol", in Proceedings of the 3rd ACM international Symposium on Mobile Ad Hoc Networking & Computing (MOBIHOC02), Lausanne, Switzerland, pp. 226 - 236, Jun 2002.
-
(2002)
Proceedings of the 3rd ACM international Symposium on Mobile Ad Hoc Networking & Computing (MOBIHOC02)
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.2
-
34
-
-
33750373147
-
Active Collaborations for Trustworthy Data Management in Ad Hoc Networks
-
November
-
A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", in Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS2005), November 2005.
-
(2005)
Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS2005)
-
-
Patwardhan, A.1
Perich, F.2
Joshi, A.3
Finin, T.4
Yesha, Y.5
-
35
-
-
17144395121
-
An analytical approach to the study of cooperation in wireless ad hoc networks
-
March
-
V. Srinivasan, P. Nuggehalli, C.-F. Chiasserini, and R. R. Rao, "An analytical approach to the study of cooperation in wireless ad hoc networks", IEEE Transactions on Wireless Communications, 4(2):722-733, March 2005.
-
(2005)
IEEE Transactions on Wireless Communications
, vol.4
, Issue.2
, pp. 722-733
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.-F.3
Rao, R.R.4
-
36
-
-
34547407799
-
Robust cooperative trust establishment for MANETs
-
Alexandria, VA, USA, pp, Oct
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "Robust cooperative trust establishment for MANETs", in Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06), Alexandria, VA, USA, pp. 23-34, Oct 2006.
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06)
, pp. 23-34
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
39
-
-
70349508803
-
-
Glomosim 2.03, http://pcl.cs.ucla.edu/projects/glomosim/.
-
Glomosim 2.03, http://pcl.cs.ucla.edu/projects/glomosim/.
-
-
-
-
40
-
-
30144440941
-
Dempster-Shafer theory for intrusion detection in ad hoc networks
-
Nov.-Dec
-
T. M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks", IEEE Internet Computing, 9(6):35-41, Nov.-Dec. 2005.
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 35-41
-
-
Chen, T.M.1
Venkataramanan, V.2
-
41
-
-
51349155690
-
On data-centric trust establishment in ephemeral ad hoc networks
-
Phoenix, AZ, USA, pp
-
th IEEE Conference on Computer Communication (INFOCOM2008), Phoenix, AZ, USA, pp. 1238-1246, 2008.
-
(2008)
th IEEE Conference on Computer Communication (INFOCOM2008)
, pp. 1238-1246
-
-
Raya, M.1
Papadimitratos, P.2
Gligor, V.D.3
Hubaux, J.-P.4
|