-
2
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C.J.C. Burges, "A Tutorial on Support Vector Machines for Pattern Recognition," Data Mining and Knowledge Discovery, vol. 2, no. 2, pp. 121-167, 1998.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
3
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Feb.
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Comm., vol. 11, no. 1, pp. 48-60, Feb. 2004.
-
(2004)
IEEE Wireless Comm.
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
10
-
-
4143084830
-
SVM-Based intrusion detection system for wireless ad hoc networks
-
H. Deng, Q.-A. Zeng, and D.P. Agrawal, "SVM-Based Intrusion Detection System for Wireless Ad Hoc Networks," Proc. IEEE 58th Vehicular Technology Conf. 2003 (VTC '03-Fall), vol. 3, pp. 2147- 2151, 2003.
-
(2003)
Proc. IEEE 58th Vehicular Technology Conf. 2003 (VTC '03-Fall)
, vol.3
, pp. 2147-2151
-
-
Deng, H.1
Zeng, Q.-A.2
Agrawal, D.P.3
-
11
-
-
33745457611
-
MAC Layer anomaly detection in ad hoc networks
-
Y. Liu, Y. Li, and H. Man, "MAC Layer Anomaly Detection in Ad Hoc Networks," Proc. Sixth Ann. IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005.
-
(2005)
Proc. Sixth Ann. IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop
-
-
Liu, Y.1
Li, Y.2
Man, H.3
-
12
-
-
24144437206
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
P. Ning and K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad-Hoc Routing Protocols," Ad Hoc Networks, vol. 3, no. 6, pp. 795-819, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.6
, pp. 795-819
-
-
Ning, P.1
Sun, K.2
-
20
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y.G. Zhang, W.K. Lee, and Y.A. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," Wireless Networks, vol. 9, no. 5, pp. 545-556, 2003.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.G.1
Lee, W.K.2
Huang, Y.A.3
-
22
-
-
33644988029
-
The theoretical analysis of FDA and applications
-
T. Qing, W. Gao-wei, and W. Jue, "The Theoretical Analysis of FDA and Applications," Pattern Recognition, vol. 39, no. 6, pp. 1199-1204, 2006.
-
(2006)
Pattern Recognition
, vol.39
, Issue.6
, pp. 1199-1204
-
-
Qing, T.1
Gao-Wei, W.2
Jue, W.3
-
23
-
-
33745777639
-
Incremental support vector learning: Analysis, implementation and applications
-
L. Pavel et al., "Incremental Support Vector Learning: Analysis, Implementation and Applications," J. Machine Learning Research, vol. 7, pp. 1909-1936, 2006.
-
(2006)
J. Machine Learning Research
, vol.7
, pp. 1909-1936
-
-
Pavel, L.1
-
24
-
-
77950023417
-
-
Scalable-Networks, Inc.
-
Qualnet Version 9, Scalable-Networks, Inc., 2005.
-
(2005)
Qualnet Version 9
-
-
-
26
-
-
78751657804
-
-
www.ntu.edu.sg/home5/john0007/althea, 2009.
-
(2009)
-
-
-
27
-
-
51649105987
-
CRADS: Integrated cross layer approach for detecting routing attacks in MANETs
-
J.F.C. Joseph et al., "CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs," Proc. Wireless Networking and Comm. Conf. (WCNC), 2008.
-
(2008)
Proc. Wireless Networking and Comm. Conf. (WCNC)
-
-
Joseph, J.F.C.1
-
28
-
-
3042645880
-
Optimized link state routing protocol
-
The Internet Society, Oct.
-
T. Clausen and P. Jacquet, "Optimized Link State Routing Protocol," RFC 3626, The Internet Society, Oct. 2003.
-
(2003)
RFC 3626
-
-
Clausen, T.1
Jacquet, P.2
|