메뉴 건너뛰기




Volumn , Issue , 2003, Pages 368-373

Challenges in intrusion detection for wireless ad-hoc networks

Author keywords

Ad hoc networks; Batteries; Communication system security; Cryptography; Information security; Intelligent networks; Intrusion detection; Protection; Routing; Wireless communication

Indexed keywords

AD HOC NETWORKS; CRYPTOGRAPHY; INTELLIGENT NETWORKS; INTERNET; INTRUSION DETECTION; MERCURY (METAL); SECURITY OF DATA; SOLAR CELLS; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 77956574096     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAINTW.2003.1210188     Document Type: Conference Paper
Times cited : (116)

References (15)
  • 3
    • 0242696192 scopus 로고    scopus 로고
    • Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-ho Networks)
    • Buchegger, S. and Boudec, J. "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-ho Networks)", In Proceedings of MOBIHOC '02, 2002.
    • Proceedings of MOBIHOC '02, 2002
    • Buchegger, S.1    Boudec, J.2
  • 4
    • 85008056769 scopus 로고    scopus 로고
    • Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection
    • Cheung, S. and Levitt, K., "Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection", In Proceedings of New Security Paradigms Workshop, 1997.
    • Proceedings of New Security Paradigms Workshop, 1997
    • Cheung, S.1    Levitt, K.2
  • 13
    • 0040749982 scopus 로고    scopus 로고
    • Cooperating Security Managers: Distributed Intrusion Detection System
    • White, G. and Pooch, U., "Cooperating Security Managers: Distributed Intrusion Detection System," Computers & Security, vol. 15, no. 5, 1996.
    • (1996) Computers & Security , vol.15 , Issue.5
    • White, G.1    Pooch, U.2
  • 15
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • November/December
    • Zhou, L. and Haas Z., "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, November/December 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.