-
1
-
-
84873998598
-
-
Crossbow Technology Inc. www.xbow.com
-
-
-
-
3
-
-
4344609431
-
Danger theory: The link between ais and ids
-
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, J. McLeod. Danger theory: The link between ais and ids. Proc. International Conference on Artificial Immune Systems (ICARIS), 2003.
-
(2003)
Proc. International Conference on Artificial Immune Systems (ICARIS)
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
5
-
-
33747294522
-
Understanding protocol performance and robustness of ad hoc networks through structural analysis
-
C. L. Barrett, M. Drozda, D. C. Engelhart, V. S. Anil Kumar, M. V. Marathe, M. M. Morin, S. S. Ravi, J. P. Smith. Understanding Protocol Performance and Robustness of Ad Hoc Networks Through Structural Analysis. Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2005.
-
(2005)
Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
-
-
Barrett, C.L.1
Drozda, M.2
Engelhart, D.C.3
Anil Kumar, V.S.4
Marathe, M.V.5
Morin, M.M.6
Ravi, S.S.7
Smith, J.P.8
-
7
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
D. Dasgupta, F. Gonzalez. An immunity-based technique to characterize intrusions in computer networks. IEEE Trans. Evolutionary Computation, vol. 6, no. 3, pp. 281-291, 2002.
-
(2002)
IEEE Trans. Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzalez, F.2
-
15
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Tomasz Imielinski and Hank Korth, Eds. Chapter 5, Kluwer Academic Publishers
-
D. Johnson, D. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, Tomasz Imielinski and Hank Korth, Eds. Chapter 5, pp. 153-181, Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
19
-
-
33745804827
-
An artificial immune system approach to misbehavior detection in mobile ad-hoc networks
-
J.-Y. Le Boudec, S. Sarafijanović. An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-Hoc Networks. Proc. Bio- ADIT'04, 2004.
-
(2004)
Proc. Bio- ADIT'04
-
-
Le Boudec, J.-Y.1
Sarafijanović, S.2
-
23
-
-
4344714071
-
Medium access control with coordinated adaptive sleeping for wireless sensor networks
-
W. Ye, J. Heidemann, D. Estrin. Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking, vol. 12, no. 3, pp. 493-506, 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.3
, pp. 493-506
-
-
Ye, W.1
Heidemann, J.2
Estrin, D.3
-
24
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y. Zhang, W. Lee, Y.A. Huang. Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks, vol. 9, no. 5, pp. 545- 556, 2003.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.A.3
|