메뉴 건너뛰기




Volumn 1, Issue 3, 2009, Pages 12-23

Intelligent IDS for mobile devices: Modeling and prototyping

Author keywords

Intrusion detection; Mobile devices; Security; Wireless networks

Indexed keywords


EID: 80053528156     PISSN: 20760930     EISSN: 2073607X     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (20)
  • 1
    • 80053516172 scopus 로고    scopus 로고
    • ANSI/IEEE Std 802.11, Edition, Part: 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications June 1999
    • ANSI/IEEE Std 802.11, 1999 Edition, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, June 1999.
    • (1999)
    • Shariff, M.1
  • 4
    • 48749093353 scopus 로고    scopus 로고
    • Using battery constrains with mobile hosts to improve network security
    • G. A. Jacoby, N. J. Davis, and R. Marchany, "Using battery constrains with mobile hosts to improve network security", IEEE Security e Privacy, Vol. 4, No. 5, pp. 40-49, 2006.
    • (2006) IEEE Security e Privacy , vol.4 , Issue.5 , pp. 40-49
    • Jacoby, G.A.1    Davis, N.J.2    Marchany, R.3
  • 5
    • 77954758479 scopus 로고    scopus 로고
    • Cloned access point detection and prevention mechanism in IEEE 802.11 wireless mesh networks
    • S. Khan, N. Mast, K.-K. Loo, A. Salahuddin, "Cloned access point detection and prevention mechanism in IEEE 802.11 wireless mesh networks," Journal of Information Assurance and Security, Vol. 3, No. 4, pp.257-262, 2008.
    • (2008) Journal of Information Assurance and Security , vol.3 , Issue.4 , pp. 257-262
    • Khan, S.1    Mast, N.2    Loo, K.-K.3    Salahuddin, A.4
  • 10
    • 33847285125 scopus 로고    scopus 로고
    • Software Tools for networking
    • O. Bonaventure, "Software Tools for networking", IEEE Network, Vol. 18, No. 6, pp 4-5, 2004.
    • (2004) IEEE Network , vol.18 , Issue.6 , pp. 4-5
    • Bonaventure, O.1
  • 13
    • 33845516367 scopus 로고    scopus 로고
    • Intrusion detection techniques
    • H. Bidgoli, ed., Wiley & Sons
    • P. Ning, S. Jajodia, "Intrusion detection techniques," The Internet Encyclopedia, H. Bidgoli, ed., Wiley & Sons, pp. 2-6, 2003.
    • (2003) The Internet Encyclopedia , pp. 2-6
    • Ning, P.1    Jajodia, S.2
  • 14
    • 25444504979 scopus 로고    scopus 로고
    • Wireless network security: 802.11, bluetooth and handheld devices
    • T. Karygiannis and L. Owens, "Wireless network security: 802.11, bluetooth and handheld devices," Special Publication 800-48, 2002.
    • (2002) Special Publication , pp. 800-848
    • Karygiannis, T.1    Owens, L.2
  • 15
    • 80053504957 scopus 로고    scopus 로고
    • Palm, Palm API Guide, Palm OS Platform - version 5.6, Available at: Accessed in 02/10//2009
    • Palm, "Palm API Guide, Palm OS Platform - version 5.6," Available at: https://pdnet.palm.com/regac/pdn/PalmOSAPIGuide/index.html, Accessed in 02/10//2009.
    • (2020)
  • 19
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: existing solutions and latest technological trends
    • A. Patcha, J. M. Park, "An overview of anomaly detection techniques: existing solutions and latest technological trends," Computer Networks, Vol. 51, No. 12, pp. 3448-3470, 2007.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.