메뉴 건너뛰기




Volumn 8, Issue 2, 2011, Pages 233-245

Cross-layer detection of sinking behavior in wireless Ad Hoc networks using SVM and FDA

Author keywords

ad hoc networks; Cross layer design; intrusion detection; routing attacks; sinking

Indexed keywords

AD HOC NETWORKS; COMPUTER CRIME; DISCRIMINANT ANALYSIS; FISHER INFORMATION MATRIX; INTRUSION DETECTION; LEARNING ALGORITHMS; NETWORK SECURITY; SUPPORT VECTOR MACHINES;

EID: 78751671554     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2009.48     Document Type: Article
Times cited : (58)

References (28)
  • 2
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C.J.C. Burges, "A Tutorial on Support Vector Machines for Pattern Recognition," Data Mining and Knowledge Discovery, vol. 2, no. 2, pp. 121-167, 1998.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 3
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Feb.
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Comm., vol. 11, no. 1, pp. 48-60, Feb. 2004.
    • (2004) IEEE Wireless Comm. , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 12
    • 24144437206 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • P. Ning and K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad-Hoc Routing Protocols," Ad Hoc Networks, vol. 3, no. 6, pp. 795-819, 2005.
    • (2005) Ad Hoc Networks , vol.3 , Issue.6 , pp. 795-819
    • Ning, P.1    Sun, K.2
  • 20
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Y.G. Zhang, W.K. Lee, and Y.A. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," Wireless Networks, vol. 9, no. 5, pp. 545-556, 2003.
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.G.1    Lee, W.K.2    Huang, Y.A.3
  • 22
    • 33644988029 scopus 로고    scopus 로고
    • The theoretical analysis of FDA and applications
    • T. Qing, W. Gao-wei, and W. Jue, "The Theoretical Analysis of FDA and Applications," Pattern Recognition, vol. 39, no. 6, pp. 1199-1204, 2006.
    • (2006) Pattern Recognition , vol.39 , Issue.6 , pp. 1199-1204
    • Qing, T.1    Gao-Wei, W.2    Jue, W.3
  • 23
    • 33745777639 scopus 로고    scopus 로고
    • Incremental support vector learning: Analysis, implementation and applications
    • L. Pavel et al., "Incremental Support Vector Learning: Analysis, Implementation and Applications," J. Machine Learning Research, vol. 7, pp. 1909-1936, 2006.
    • (2006) J. Machine Learning Research , vol.7 , pp. 1909-1936
    • Pavel, L.1
  • 24
    • 77950023417 scopus 로고    scopus 로고
    • Scalable-Networks, Inc.
    • Qualnet Version 9, Scalable-Networks, Inc., 2005.
    • (2005) Qualnet Version 9
  • 26
    • 78751657804 scopus 로고    scopus 로고
    • www.ntu.edu.sg/home5/john0007/althea, 2009.
    • (2009)
  • 27
    • 51649105987 scopus 로고    scopus 로고
    • CRADS: Integrated cross layer approach for detecting routing attacks in MANETs
    • J.F.C. Joseph et al., "CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs," Proc. Wireless Networking and Comm. Conf. (WCNC), 2008.
    • (2008) Proc. Wireless Networking and Comm. Conf. (WCNC)
    • Joseph, J.F.C.1
  • 28
    • 3042645880 scopus 로고    scopus 로고
    • Optimized link state routing protocol
    • The Internet Society, Oct.
    • T. Clausen and P. Jacquet, "Optimized Link State Routing Protocol," RFC 3626, The Internet Society, Oct. 2003.
    • (2003) RFC 3626
    • Clausen, T.1    Jacquet, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.