메뉴 건너뛰기




Volumn 4, Issue 7, 2009, Pages 565-579

On-Line and off-line security measurement framework for mobile ad hoc networks

Author keywords

Mobile ad hoc networks; Monitoring; Security evaluation; Security metrics

Indexed keywords

BEHAVIOUR MODELLING; COMMUNICATION MECHANISMS; DECISION MAKING PROCESS; EVIDENCE COLLECTION; INFORMATION SECURITY; MONITORING SYSTEM; NETWORK LEVEL; NETWORK SEGMENT; ON-THE-FLY; SECURITY CHALLENGES; SECURITY EVALUATION; SECURITY LEVEL; SECURITY MEASUREMENT; SECURITY METRICS; SECURITY REQUIREMENTS; SELF ORGANIZING;

EID: 77950991593     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.4.7.565-579     Document Type: Article
Times cited : (10)

References (49)
  • 2
    • 1842815887 scopus 로고    scopus 로고
    • Security in Mobile Ad Hoc Networks: Challenges and Solutions
    • Feb
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Comm., Vol. 11, No. 1., Feb. 2004, 38-47.
    • (2004) IEEE Wireless Comm , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 3
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • Nov/Dec
    • L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network, Vol. 13, No. 6, Nov/Dec 1999, 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 7
    • 33745493480 scopus 로고    scopus 로고
    • SSE-CMM Security Metrics
    • Washington, D.C
    • G. Jelen, "SSE-CMM Security Metrics," NIST and CSSPAB Workshop, Washington, D.C., 2000.
    • (2000) NIST and CSSPAB Workshop
    • Jelen, G.1
  • 8
    • 78651559667 scopus 로고    scopus 로고
    • On Assurance, Measures, and Metrics: Definitions and Approaches
    • Williamsburg, Virginia, May, 2001, publ
    • J. I. Alger, "On Assurance, Measures, and Metrics: Definitions and Approaches," Information Security System Scoring and Ranking (WISSSR), Williamsburg, Virginia, May, 2001, publ. 2002.
    • (2002) Information Security System Scoring and Ranking (WISSSR)
    • Alger, J.I.1
  • 9
    • 47849117993 scopus 로고    scopus 로고
    • SANS Institute Information Security Reading Room
    • S. C. Payne, "A Guide to Security Metrics," SANS Institute Information Security Reading Room, 2006.
    • (2006) A Guide to Security Metrics
    • Payne, S.C.1
  • 13
    • 78651523165 scopus 로고    scopus 로고
    • Workshop on Information Security Scoring and Ranking - Information System Security Attribute Quantification or Ordering
    • R. Henning (Ed.)
    • R. Henning (Ed.), Workshop on Information Security Scoring and Ranking - Information System Security Attribute Quantification or Ordering. Applied Computer Security Associates, 2001.
    • (2001) Applied Computer Security Associates
  • 16
    • 33747205462 scopus 로고    scopus 로고
    • On the Brittleness of Software and the Infeasibility of Security Metrics
    • Jul/Aug
    • S. M. Bellovin, "On the Brittleness of Software and the Infeasibility of Security Metrics," IEEE Security & Privacy, Jul/Aug, p. 96, 2006.
    • (2006) IEEE Security & Privacy , pp. 96
    • Bellovin, S.M.1
  • 17
    • 70349260162 scopus 로고    scopus 로고
    • The Risks with Security Metrics
    • Conference on Computer and Communications Security archive, Alexandria, Virginia, USA, October
    • M. D. Aime, A. Atzeni and P. C. Pomi, "The Risks with Security Metrics," Conference on Computer and Communications Security archive, Proceedings of the 4th ACM workshop on Quality of Protection, 2008, Alexandria, Virginia, USA, October 27-27, 2008, 65-70.
    • (2008) Proceedings of the 4th ACM workshop on Quality of Protection, 2008 , pp. 27-27
    • Aime, M.D.1    Atzeni, A.2    Pomi, P.C.3
  • 18
    • 78651533035 scopus 로고    scopus 로고
    • A Few Good Security Metrics
    • P. Burris, C. King, "A Few Good Security Metrics," METAGroup, 2000.
    • (2000) METAGroup
    • Burris, P.1    King, C.2
  • 19
    • 0035195322 scopus 로고    scopus 로고
    • Why is it so Hard to Predict Software System Trustworthiness from Sofware Component Trustworthiness?
    • J. Voas, "Why is it so Hard to Predict Software System Trustworthiness from Sofware Component Trustworthiness?," 20th IEEE Symposium on Reliable Distributed Systems, 2001, p. 179.
    • (2001) 20th IEEE Symposium on Reliable Distributed Systems , pp. 179
    • Voas, J.1
  • 20
    • 0242678584 scopus 로고    scopus 로고
    • Self-Organized Public-Key Management for Mobile Ad Hoc Networks
    • S. Čapkun, L. Buttyán and J.-P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Tr. Mobile Computing, Vol. 2, No. 1, 2003, 52-64.
    • (2003) IEEE Tr. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Čapkun, S.1    Buttyán, L.2    Hubaux, J.-P.3
  • 22
    • 0036452448 scopus 로고    scopus 로고
    • Context Aware Detection of Selfish Nodes in DSR Based Ad Hoc Networks
    • K. Paul and D. Westhoff, "Context Aware Detection of Selfish Nodes in DSR Based Ad Hoc Networks," IEEE Vehicular Technology Conference, Vol. 56, No. 4., 2002, 2424-2429.
    • (2002) IEEE Vehicular Technology Conference , vol.56 , Issue.4 , pp. 2424-2429
    • Paul, K.1    Westhoff, D.2
  • 23
    • 0035178273 scopus 로고    scopus 로고
    • Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks
    • Fall
    • S. Bhargava and D. P. Agrawal, "Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks," IEEE Vehicular Technology Conference (VTC 2001) Fall, Vol. 4, 2001, 2143-2147.
    • (2001) IEEE Vehicular Technology Conference (VTC 2001) , vol.4 , pp. 2143-2147
    • Bhargava, S.1    Agrawal, D.P.2
  • 25
    • 15844362443 scopus 로고    scopus 로고
    • Ad Hoc Networks Security
    • Basagni, S., Conti, M., Giordano, S., and Stojmenovic (Eds.), IEEE Press Wiley, New York
    • P. Michiardi and R. Molva, "Ad Hoc Networks Security," In Basagni, S., Conti, M., Giordano, S., and Stojmenovic (Eds.), Ad Hoc Networking, IEEE Press Wiley, New York, 2003.
    • (2003) Ad Hoc Networking
    • Michiardi, P.1    Molva, R.2
  • 31
    • 0035149763 scopus 로고    scopus 로고
    • Usability and Security - An Appraisal of Usability Issues in Information Security Methods
    • oct
    • E. E. Schultz, R. W. Proctor, M.-C. Lien and G. Salvendy, "Usability and Security - An Appraisal of Usability Issues in Information Security Methods," Computer Security, Vol. 20, No. 7, Oct. 2001, 620-634.
    • (2001) Computer Security , vol.20 , Issue.7 , pp. 620-634
    • Schultz, E.E.1    Proctor, R.W.2    Lien, M.-C.3    Salvendy, G.4
  • 32
    • 0032626827 scopus 로고    scopus 로고
    • Attitudes, Satisfaction and Usage: Factors Contributing to Each in the Acceptance of Information Technology
    • S. S. Al-Ghatani and M. King, "Attitudes, Satisfaction and Usage: Factors Contributing to Each in the Acceptance of Information Technology," Behaviour and Information Technology, 19, 277-297.
    • Behaviour and Information Technology , vol.19 , pp. 277-297
    • Al-Ghatani, S.S.1    King, M.2
  • 34
    • 33746905298 scopus 로고    scopus 로고
    • IEEE Std., 1061-1998, Revision, IEEE Standards Dept., Piscataway, N.J
    • IEEE Std. 1061-1998, "Standard for a Software Quality Metrics Methodology," Revision, IEEE Standards Dept., Piscataway, N.J., 1998.
    • (1998) Standard for a Software Quality Metrics Methodology
  • 35
    • 49149101267 scopus 로고    scopus 로고
    • Holistic Estimation of Security, Privacy and Trust in Mobile Ad Hoc Networks
    • Damascus, Syria
    • R. Savola, "Holistic Estimation of Security, Privacy and Trust in Mobile Ad Hoc Networks," Int. Conf. on Information and Communication Technologies (ICTTA) 2008, Damascus, Syria, 6 p.
    • (2008) Int. Conf. on Information and Communication Technologies (ICTTA) , pp. 6
    • Savola, R.1
  • 43
  • 44
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion Detection in Wireless Ad Hoc Networks
    • Feb
    • A. Mishra, K. Nadkarni and A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Comm., Feb. 2004, 48-60.
    • (2004) IEEE Wireless Comm. , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 45
    • 84950162203 scopus 로고    scopus 로고
    • Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
    • O. Kachirski and R. Guha, "Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks," IEEE Workshop on Knowledge Media Networks, 2002, 153-158.
    • (2002) IEEE Workshop on Knowledge Media Networks , pp. 153-158
    • Kachirski, O.1    Guha, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.