-
1
-
-
17644368369
-
Cryptography in embedded systems: An overview
-
Nuernberg, Germany
-
T. Wollinger, J. Guajardo, C. Paar, Cryptography in embedded systems: an overview, in: Embedded World 2003 Exhibition and Conference, Nuernberg, Germany, 2003.
-
(2003)
Embedded World 2003 Exhibition and Conference
-
-
Wollinger, T.1
Guajardo, J.2
Paar, C.3
-
2
-
-
0043126255
-
-
Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge 1p
-
Rivest R.L., Shamir A., and Adleman L.M. A method for obtaining digital signatures and public-key cryptosystems (Rev. Ed.) vol. 15 (1977), Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge 1p
-
(1977)
A method for obtaining digital signatures and public-key cryptosystems (Rev. Ed.)
, vol.15
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
3
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network 13 (1999) 24-30
-
(1999)
IEEE Network
, vol.13
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
4
-
-
57349159239
-
Security as a new dimension in embedded system design
-
P. Kocher, et al., Security as a new dimension in embedded system design, in: 41st Design Automation Conference, 2004.
-
(2004)
41st Design Automation Conference
-
-
Kocher, P.1
-
5
-
-
33847735919
-
Quantum computing is exciting and important-really!
-
p. 104
-
Day C. Quantum computing is exciting and important-really!. Computing in Science and Engineering 9 2 (2007) p. 104
-
(2007)
Computing in Science and Engineering
, vol.9
, Issue.2
-
-
Day, C.1
-
6
-
-
11944271788
-
DVD copy protection: take 2
-
Perry T.S. DVD copy protection: take 2. IEEE Spectrum 42 1 (2005) 38-39
-
(2005)
IEEE Spectrum
, vol.42
, Issue.1
, pp. 38-39
-
-
Perry, T.S.1
-
8
-
-
34250315640
-
An overview of anomaly detection techniques: existing solutions and latest technological trends
-
Patcha A., and Park J.-M. An overview of anomaly detection techniques: existing solutions and latest technological trends. Computer Networks 51 12 (2007) 3448-3470
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
9
-
-
72949091293
-
Intelligent intrusion detection: A behavior-based approach
-
Niagara Falls, Canada
-
A.P. Lauf, R.A. Peters, W.H. Robinson, Intelligent intrusion detection: a behavior-based approach, in: The 21st Advanced Information Networking and Applications: Symposium for Embedded Computing, Niagara Falls, Canada, 2007.
-
(2007)
The 21st Advanced Information Networking and Applications: Symposium for Embedded Computing
-
-
Lauf, A.P.1
Peters, R.A.2
Robinson, W.H.3
-
10
-
-
36849010124
-
A Survey on attacks and countermeasures in mobile ad hoc networks
-
Xiao X.S.Y., and Du D.-Z. (Eds), Springer
-
Wu B., et al. A Survey on attacks and countermeasures in mobile ad hoc networks. In: Xiao X.S.Y., and Du D.-Z. (Eds). Wireless/Mobile Network Security (2006), Springer
-
(2006)
Wireless/Mobile Network Security
-
-
Wu, B.1
-
11
-
-
39749195430
-
Analysis of payload based application level network anomaly detection
-
Hawaii International Conference on System Sciences, HICSS 2007
-
Z. Like, B.W. Gregory, Analysis of payload based application level network anomaly detection, in: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007.
-
40th Annual
-
-
Like, Z.1
Gregory, B.W.2
-
12
-
-
0034546898
-
Intrusion detection in wireless ad hoc networks
-
Boston, MA, United States
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad hoc networks, in: Proceedings of the sixth annual international conference on Mobile computing and networking, ACM: Boston, MA, United States, 2000.
-
(2000)
Proceedings of the sixth annual international conference on Mobile computing and networking, ACM
-
-
Zhang, Y.1
Lee, W.2
-
13
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang Y., Lee W., and Huang Y.-A. Intrusion detection techniques for mobile wireless networks. Wireless Networks 9 5 (2003)
-
(2003)
Wireless Networks
, vol.9
, Issue.5
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
15
-
-
24744455037
-
Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
-
A. Yamada, et al., Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data, in: International Conference on Information Technology: Coding and Computing, ITCC, 2005.
-
(2005)
International Conference on Information Technology: Coding and Computing, ITCC
-
-
Yamada, A.1
-
16
-
-
16244397709
-
-
C. Daskalakis, P. Martone, Alternative surveillance technology for the Gulf of Mexico, in: The 23rd Digital Avionics Systems Conference, DASC 04, 2004.
-
C. Daskalakis, P. Martone, Alternative surveillance technology for the Gulf of Mexico, in: The 23rd Digital Avionics Systems Conference, DASC 04, 2004.
-
-
-
-
19
-
-
19244367964
-
Testing of traffic information service broadcast (TIS-B) and ADS-B at Memphis International Airport
-
R. Nichols, et al. Testing of traffic information service broadcast (TIS-B) and ADS-B at Memphis International Airport, in: The 21st Digital Avionics Systems Conference, 2002.
-
(2002)
The 21st Digital Avionics Systems Conference
-
-
Nichols, R.1
-
20
-
-
72949114126
-
-
Swarming for Success, in: Astrobiology Magazine. NASA Ames., 2005.
-
Swarming for Success, in: Astrobiology Magazine. NASA Ames., 2005.
-
-
-
-
22
-
-
33847372974
-
Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad hoc networks
-
J.B.D. Cabrera, C. Gutierrez, R.K. Mehra, Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad hoc networks, in: IEEE Conference on Military Communications, MILCOM, 2005.
-
(2005)
IEEE Conference on Military Communications, MILCOM
-
-
Cabrera, J.B.D.1
Gutierrez, C.2
Mehra, R.K.3
-
23
-
-
33845882200
-
-
Z. Xiaoqiang, Z. Zhongliang, F. Pingzhi, Intrusion detection based on cross-correlation of system call sequences, in: 17th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 05, 2005.
-
Z. Xiaoqiang, Z. Zhongliang, F. Pingzhi, Intrusion detection based on cross-correlation of system call sequences, in: 17th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 05, 2005.
-
-
-
-
24
-
-
33847144165
-
Artificial intelligence techniques applied to intrusion detection
-
N.B. Idris, B. Shanmugam, Artificial intelligence techniques applied to intrusion detection, in: INDICON2005, 2005.
-
(2005)
INDICON2005
-
-
Idris, N.B.1
Shanmugam, B.2
-
26
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
S. Buchegger, J.Y. Le Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, in: 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002.
-
(2002)
10th Euromicro Workshop on Parallel, Distributed and Network-based Processing
-
-
Buchegger, S.1
Le Boudec, J.Y.2
-
28
-
-
24744432675
-
Self-policing mobile ad hoc networks by reputation systems
-
S. Buchegger, J.Y. Le Boudec, Self-policing mobile ad hoc networks by reputation systems, in: IEEE Communications Magazine, 2005, pp. 101-107.
-
(2005)
IEEE Communications Magazine
, pp. 101-107
-
-
Buchegger, S.1
Le Boudec, J.Y.2
-
30
-
-
24744432675
-
Self-policing mobile ad hoc networks by reputation systems
-
Buchegger S., and Le Boudee J.Y. Self-policing mobile ad hoc networks by reputation systems. Communications Magazine IEEE 43 7 (2005) 101-107
-
(2005)
Communications Magazine IEEE
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudee, J.Y.2
-
36
-
-
53749101677
-
LIDF: layered intrusion detection framework for ad hoc networks
-
Komninos N., and Douligeris C. LIDF: layered intrusion detection framework for ad hoc networks. Ad Hoc Networks 7 (2009) 171-182
-
(2009)
Ad Hoc Networks
, vol.7
, pp. 171-182
-
-
Komninos, N.1
Douligeris, C.2
-
37
-
-
33845889547
-
Detecting unauthorized and compromised nodes in mobile ad hoc networks
-
Komninos N., Vergados D., and Douligeris C. Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks 5 (2007) 289-298
-
(2007)
Ad Hoc Networks
, vol.5
, pp. 289-298
-
-
Komninos, N.1
Vergados, D.2
Douligeris, C.3
-
38
-
-
39149119287
-
Collaborative techniques for intrusion detection in mobile ad hoc networks
-
in press
-
N. Marchang, R. Datta, Collaborative techniques for intrusion detection in mobile ad hoc networks. Ad Hoc Networks, in press.
-
Ad Hoc Networks
-
-
Marchang, N.1
Datta, R.2
-
40
-
-
33744470567
-
Analysis of a reputation system for mobile ad hoc networks with liars
-
J. Mundinger, J.Y. Le Boudec, Analysis of a reputation system for mobile ad hoc networks with liars, in: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WIOPT, 2005.
-
(2005)
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WIOPT
-
-
Mundinger, J.1
Le Boudec, J.Y.2
-
41
-
-
39149117388
-
Threshold-based intrusion detection in ad hoc networks and secure AODV
-
Patwardhan A., Parker J., Iorga M., Joshi A., Karygiannis T., and Yesha Y. Threshold-based intrusion detection in ad hoc networks and secure AODV. Ad Hoc Networks 6 (2008) 578-599
-
(2008)
Ad Hoc Networks
, vol.6
, pp. 578-599
-
-
Patwardhan, A.1
Parker, J.2
Iorga, M.3
Joshi, A.4
Karygiannis, T.5
Yesha, Y.6
-
42
-
-
46449126324
-
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
-
Razak S.A., Furnell S.M., Clarke N.L., and Brooke P.J. Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6 (2008) 1151-1167
-
(2008)
Ad Hoc Networks
, vol.6
, pp. 1151-1167
-
-
Razak, S.A.1
Furnell, S.M.2
Clarke, N.L.3
Brooke, P.J.4
-
44
-
-
34247527847
-
-
W. Xia, Intrusion detection techniques in wireless ad hoc networks, in: 30th Annual International Computer Software and Applications Conference, COMPSAC '06, 2006
-
W. Xia, Intrusion detection techniques in wireless ad hoc networks, in: 30th Annual International Computer Software and Applications Conference, COMPSAC '06, 2006.
-
-
-
-
45
-
-
34548323745
-
Attack analysis and detection for ad hoc routing protocols
-
Springer, Berlin/Heidelberg
-
Huang Y.-A., and Lee W. Attack analysis and detection for ad hoc routing protocols. Recent Advances in Intrusion Detection (2004), Springer, Berlin/Heidelberg 125-145
-
(2004)
Recent Advances in Intrusion Detection
, pp. 125-145
-
-
Huang, Y.-A.1
Lee, W.2
-
46
-
-
72949098874
-
-
Generic Modeling Environment, 2000-2007, Vanderbilt University, Nashville.
-
Generic Modeling Environment, 2000-2007, Vanderbilt University, Nashville.
-
-
-
|