-
1
-
-
0031703272
-
Detecting Disruptive Routers: A Distributed Network Monitoring Approach
-
Bradley, K., Cheung, S., Puketza, N., Mukherjee, B., and Olsson, R. "Detecting Disruptive Routers: A Distributed Network Monitoring Approach, In Proceedings of IEEE Symposium on Security and Privacy, May 1998.
-
Proceedings of IEEE Symposium on Security and Privacy, May 1998
-
-
Bradley, K.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.5
-
2
-
-
0013365091
-
Electronic Quarantine: An Automated Intruder Response Tool
-
Brutch, P., Brutch, T., and Pooch, U. "Electronic Quarantine: An Automated Intruder Response Tool", In Proceedings of Information Survivability Workshop, 1998.
-
Proceedings of Information Survivability Workshop, 1998
-
-
Brutch, P.1
Brutch, T.2
Pooch, U.3
-
3
-
-
0242696192
-
Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-ho Networks)
-
Buchegger, S. and Boudec, J. "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-ho Networks)", In Proceedings of MOBIHOC '02, 2002.
-
Proceedings of MOBIHOC '02, 2002
-
-
Buchegger, S.1
Boudec, J.2
-
5
-
-
84962306569
-
Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure
-
Jou, Y., Gong, F., Sargor, C., Wu, X., Wu, S., Chang, H., and Wang, F., "Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure", In Proceedings of DARPA Information Survivability Conference and Exposition, 2000.
-
Proceedings of DARPA Information Survivability Conference and Exposition, 2000
-
-
Jou, Y.1
Gong, F.2
Sargor, C.3
Wu, X.4
Wu, S.5
Chang, H.6
Wang, F.7
-
6
-
-
0002764240
-
Execution Monitoring of Security Critical Programs in Distributed Systems: A specification-based approach
-
Ko, C., Ruschitzka, M., and Levitt, K. "Execution Monitoring of Security Critical Programs in Distributed Systems: A specification-based approach," In Proceedings of Symposium on Security and Privacy, 1997.
-
Proceedings of Symposium on Security and Privacy, 1997
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
8
-
-
0345755816
-
Adaptive Security for Multi-layer Ad-hoc Networks
-
Kong, J., Luo, H., Xu, K., Gu, D., Gerla, M., and Lu, S.,"Adaptive Security for Multi-layer Ad-hoc Networks," Special Issue of Wireless Communication and Mobile Computing, 2002.
-
(2002)
Special Issue of Wireless Communication and Mobile Computing
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.4
Gerla, M.5
Lu, S.6
-
10
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Marti, S., Giuli, T., Lai, K., and Baker, M., "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," In Proceedings of the Sixth Annual International Conference on Mobile Communication and Networking, 2000.
-
Proceedings of the Sixth Annual International Conference on Mobile Communication and Networking, 2000
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
11
-
-
1842693637
-
A New Intrusion Detection Method based on Process Profiling
-
Okazaki, Y., Sato, I., and Goto, S., "A New Intrusion Detection Method based on Process Profiling", In Proceedings of 2002 Symposium on Applications and the Internet (SAINT '02), 2002.
-
Proceedings of 2002 Symposium on Applications and the Internet (SAINT '02), 2002
-
-
Okazaki, Y.1
Sato, I.2
Goto, S.3
-
13
-
-
0040749982
-
Cooperating Security Managers: Distributed Intrusion Detection System
-
White, G. and Pooch, U., "Cooperating Security Managers: Distributed Intrusion Detection System," Computers & Security, vol. 15, no. 5, 1996.
-
(1996)
Computers & Security
, vol.15
, Issue.5
-
-
White, G.1
Pooch, U.2
-
15
-
-
0033357103
-
Securing Ad Hoc Networks
-
November/December
-
Zhou, L. and Haas Z., "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.2
|