-
1
-
-
0003478316
-
The architecture of a network level intrusion detection system,
-
Technical report, Computer Science Department, University of New Mexico
-
Heady, R., Luger, G., Maccabe, A., and Servilla, M, "The architecture of a network level intrusion detection system," Technical report, Computer Science Department, University of New Mexico, 1990.
-
(1990)
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
2
-
-
0033357103
-
Securing ad hoc networks
-
Zhou, L., and Haas, Z.J., "Securing ad hoc networks," IEEE Networks Issue on Network Security, November,1999.
-
(1999)
IEEE Networks Issue on Network Security, November
-
-
Zhou, L.1
Haas, Z.J.2
-
3
-
-
0003456435
-
Secure Ad hoc On-Demand Distance Vector (SAODV) Routing
-
IETF MANET Mailing List, Message-ID 3BC17B40.BBF52E09
-
Zapata, M.G., "Secure Ad hoc On-Demand Distance Vector (SAODV) Routing," IETF MANET Mailing List, Message-ID 3BC17B40.BBF52E09, 2002.
-
(2002)
-
-
Zapata, M.G.1
-
4
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
WMCSA
-
Hu, Y.C., Johnson, D.B. and Perrig, A, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," Fourth IEEE Workshop on MobileComputing Systems and Applications (WMCSA), 2002.
-
(2002)
Fourth IEEE Workshop on MobileComputing Systems and Applications
-
-
Hu, Y.C.1
Johnson, D.B.2
Perrig, A.3
-
5
-
-
26444616647
-
-
T.Srinivasan,Jayesh Seshadri,J.B.Sidharth Jonathan,Arvind Chandrasekhar, A System for Power Aware Intrusion Detection in Wireless Ad-Hoc Networks, In Proceedings of Third International Conference on Computer Networks and Mobile Computing - ICCNMC 2005, Springer-Verlag Berlin Heidelberg, LNCS 3619, pp.153-162, Zhangjiajie, China, August 3-5 2005
-
T.Srinivasan,Jayesh Seshadri,J.B.Sidharth Jonathan,Arvind Chandrasekhar, "A System for Power Aware Intrusion Detection in Wireless Ad-Hoc Networks," In Proceedings of Third International Conference on Computer Networks and Mobile Computing - ICCNMC 2005, Springer-Verlag Berlin Heidelberg, LNCS 3619, pp.153-162, Zhangjiajie, China, August 3-5 2005
-
-
-
-
8
-
-
0033684488
-
-
Bernardes, M.C., and Moreira, E.S., Implementation of an intrusion detection system based on mobile agents, In Proceedings of International Symposium on Software Engineering for Parallel and Distributed Systems,2000.
-
Bernardes, M.C., and Moreira, E.S., "Implementation of an intrusion detection system based on mobile agents," In Proceedings of International Symposium on Software Engineering for Parallel and Distributed Systems,2000.
-
-
-
-
9
-
-
0034546898
-
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
-
MobiCom, pp
-
Zhang, Y., and Lee, W., "Intrusion detection in wireless adhoc networks," Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom, pp. 275-283, 2000.
-
(2000)
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
10
-
-
7744238188
-
-
Technical Report Department of Computer Science, Rice University
-
Perrig, A., Hu, Y.C., and Johnson, D.B., "wormhole protection in wireless ad hoc networks," Technical Report Department of Computer Science, Rice University, 2001.
-
(2001)
wormhole protection in wireless ad hoc networks
-
-
Perrig, A.1
Hu, Y.C.2
Johnson, D.B.3
-
11
-
-
0036986441
-
An On-demand routing protocol resilent to byzantine failures
-
Awerbuch, B., Holmer, D., Nita-Rotaru, C., and Rubens H., "An On-demand routing protocol resilent to byzantine failures," In ACM Workshop on Wireless Security , 2002.
-
(2002)
ACM Workshop on Wireless Security
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
12
-
-
26744432427
-
Authenticated ad hoc routing at the link layer for mobile systems,
-
Technical Report 96-3, Portland State University, Computer Science
-
James Binkley., "Authenticated ad hoc routing at the link layer for mobile systems," Technical Report 96-3, Portland State University, Computer Science, 1996.
-
(1996)
-
-
Binkley, J.1
-
13
-
-
23044520423
-
-
A. Boukerche and Mirela Sechi Moretti Annoni Notare, Neural fraud detection in mobile phone operations, In Proceedings of the IPDPS 2000 Workshops, Cancun, Mexico, pages 636-644, May 1-5 2000.
-
A. Boukerche and Mirela Sechi Moretti Annoni Notare, " Neural fraud detection in mobile phone operations," In Proceedings of the IPDPS 2000 Workshops, Cancun, Mexico, pages 636-644, May 1-5 2000.
-
-
-
-
14
-
-
71249135109
-
-
J. Broch, D. Johnson, and D. Maltz. , The dynamic source routing protocol for mobile adhoc networks, Internet draftdraftietf-manet-dsr-01. txt, December 1998.
-
J. Broch, D. Johnson, and D. Maltz. , " The dynamic source routing protocol for mobile adhoc networks," Internet draftdraftietf-manet-dsr-01. txt, December 1998.
-
-
-
-
17
-
-
0029716418
-
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longsta,A sense of self for Unix processes, In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128,Los Alamitos, CA, 1996. IEEE Computer Society Press.
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longsta,"A sense of self for Unix processes," In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128,Los Alamitos, CA, 1996. IEEE Computer Society Press.
-
-
-
-
18
-
-
0003478316
-
The architecture of a network level intrusion detection system,
-
Technical report, Computer Science Department, University of New Mexico, August
-
R. Heady, G. Luger, A. Maccabe, and M. Servilla., "The architecture of a network level intrusion detection system," Technical report, Computer Science Department, University of New Mexico, August 1990.
-
(1990)
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
19
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras., "State transition analysis: A rule-based intrusion detection approach," IEEE Transactions on Software Engineering, 21(3):181-199,March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
20
-
-
71249117309
-
-
S. Jacobs and M. S. Corson , MANET authentication architecture,Internetdraft-jacobs-imep-auth-arch1.txt,expired 2000, February 1999.
-
S. Jacobs and M. S. Corson , "MANET authentication architecture,"Internetdraft-jacobs-imep-auth-arch1.txt,expired 2000, February 1999.
-
-
-
-
24
-
-
0036079805
-
-
P. Lichodzijewski, A., Zincir-Heywood and M. I. Heywood, Host-based intrusion detection using self-organizing maps, In Proceedings of the 2002 IEEE World Congress on Computational Intelligence, 2002 (in press).
-
P. Lichodzijewski, A., Zincir-Heywood and M. I. Heywood, "Host-based intrusion detection using self-organizing maps," In Proceedings of the 2002 IEEE World Congress on Computational Intelligence, 2002 (in press).
-
-
-
-
26
-
-
0031277463
-
Distributed learning, recognition, and prediction by ART and ARTMAP neural networks
-
Carpenter, G.A., "Distributed learning, recognition, and prediction by ART and ARTMAP neural networks ," Neural Networks, 10:1473-1494,1997
-
(1997)
Neural Networks
, vol.10
, pp. 1473-1494
-
-
Carpenter, G.A.1
|