메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 310-318

A context adaptive intrusion detection system for MANET

Author keywords

Context awareness; Intrusion Detection System; Lifetime; MANET; Network security

Indexed keywords

ANOMALOUS BEHAVIOR; CONTEXT- AWARENESS; CUT-THROUGH; ENERGY BUDGETS; INCOMING PACKETS; INTRUSION DETECTION SYSTEM; INTRUSION DETECTION SYSTEMS; LIFETIME; MANET; MOBILE NODES; NETWORK LIFETIME; NETWORK NODE; NUMERICAL RESULTS; RESIDUAL ENERGY; RESOURCE BUDGET; REWARD FUNCTION; SECURITY BREACHES; SECURITY THREATS; TRAFFIC LOADING; WIRED NETWORKS;

EID: 78751641756     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.06.015     Document Type: Article
Times cited : (18)

References (15)
  • 1
    • 0003582910 scopus 로고    scopus 로고
    • Ad hoc networking: An introduction
    • C.E. Perkins Ad hoc networking: an introduction C.E. Perkins, Ad Hoc Networking 2000 Addison-Wesley
    • (2000) Ad Hoc Networking
    • Perkins, C.E.1
  • 4
    • 78751643074 scopus 로고    scopus 로고
    • Review of continuous-time Markov chains and applications
    • T. Bielecki Review of continuous-time Markov chains and applications IEEE Transactions on Automatic Control 45 3 2000 597 598
    • (2000) IEEE Transactions on Automatic Control , vol.45 , Issue.3 , pp. 597-598
    • Bielecki, T.1
  • 5
    • 0042474230 scopus 로고    scopus 로고
    • Detecting network intrusions via sampling: A game theoretic approach
    • M. Kodialam, T.V. Lakshman, Detecting network intrusions via sampling: a game theoretic approach, in: IEEE INFOCOM, 2003.
    • (2003) IEEE INFOCOM
    • Kodialam, M.1    Lakshman, T.V.2
  • 6
    • 24144441735 scopus 로고    scopus 로고
    • Preventing DoS attack in sensor networks a game theoretic approach
    • A. Agah, K. Basu, S.K. Das, Preventing DoS attack in sensor networks, a game theoretic approach, in: IEEE International Conference on Communications, vol. 5, 2005, pp. 3218-3222.
    • (2005) IEEE International Conference on Communications , vol.5 , pp. 3218-3222
    • Agah, A.1    Basu, K.2    Das, S.K.3
  • 8
    • 0017416837 scopus 로고    scopus 로고
    • Hierarchical routing for large networks: Performance evaluation and optimization
    • L. Kleinrock, and F. Kamoun Hierarchical routing for large networks: performance evaluation and optimization Computer Networks 1 1 1997 155 174
    • (1997) Computer Networks , vol.1 , Issue.1 , pp. 155-174
    • Kleinrock, L.1    Kamoun, F.2
  • 12
    • 27544434207 scopus 로고    scopus 로고
    • A cooperative intrusion detection system for ad hoc networks
    • Y. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of the SASN, 2003.
    • (2003) Proceedings of the SASN
    • Huang, Y.1    Lee, W.2
  • 13
    • 0031130974 scopus 로고    scopus 로고
    • LSTF: A new scheduling policy for complex real-time tasks in multiple processor systems
    • B.C. Cheng, A.D. Stoyenko, T.J. Marlowe, and S. Baruah LSTF: a new scheduling policy for complex real-time tasks in multiple processor systems Automatica 33 5 1997 921 926
    • (1997) Automatica , vol.33 , Issue.5 , pp. 921-926
    • Cheng, B.C.1    Stoyenko, A.D.2    Marlowe, T.J.3    Baruah, S.4
  • 15
    • 67651112001 scopus 로고    scopus 로고
    • A good IDS response protocol of MANET containment strategies
    • B.C. Cheng, H. Chen, and R.Y. Tseng A good IDS response protocol of MANET containment strategies IEICE Transactions on Communications E91-B 11 2008 3657 3666
    • (2008) IEICE Transactions on Communications , vol.91 , Issue.11 , pp. 3657-3666
    • Cheng, B.C.1    Chen, H.2    Tseng, R.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.