-
1
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
M. Weiser Some computer science issues in ubiquitous computing Communications of the ACM 36 7 1993 74 84
-
(1993)
Communications of the ACM
, vol.36
, Issue.7
, pp. 74-84
-
-
Weiser, M.1
-
2
-
-
0001853125
-
The computer for the 21st century
-
M. Weiser The computer for the 21st century Scientific American 265 3 1991 94 104
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
4
-
-
0037341461
-
Pervasive computing: A paradigm for the 21st century
-
D. Saha, and A. Mukherjee Pervasive computing: a paradigm for the 21st century IEEE Computer 36 3 2003 25 31
-
(2003)
IEEE Computer
, vol.36
, Issue.3
, pp. 25-31
-
-
Saha, D.1
Mukherjee, A.2
-
5
-
-
0001966090
-
A review of current routing protocols for ad-hoc mobile wireless networks
-
E. Royer, C. Toh, A review of current routing protocols for ad-hoc mobile wireless networks, IEEE personal communications.
-
IEEE Personal Communications
-
-
Royer, E.1
Toh, C.2
-
7
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou, and Z. Haas Securing ad hoc networks IEEE Network Magazine 13 6 Nov/Dec 1999 24 30
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
10
-
-
0002511642
-
An overview of artificial immune systems and their applications
-
D. Dasgupta, Springer-Verlag Berlin
-
D. Dasgupta An overview of artificial immune systems and their applications D. Dasgupta, Artificial Immune Systems and Their Applications 1998 Springer-Verlag Berlin 3 21
-
(1998)
Artificial Immune Systems and Their Applications
, pp. 3-21
-
-
Dasgupta, D.1
-
13
-
-
0003205375
-
The artificial immune model for network intrusion detection
-
J. Kim, and P. Bentley The artificial immune model for network intrusion detection Proceedings of the EUFIT'99 1999
-
(1999)
Proceedings of the EUFIT'99
-
-
Kim, J.1
Bentley, P.2
-
15
-
-
35449005874
-
Immune system approaches to intrusion detection - A review
-
DOI 10.1007/s11047-006-9026-4
-
J. Kim, P. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross Immune system approaches to intrusion detection - a review Natural Computing 6 4 2007 413 466 (Pubitemid 47629391)
-
(2007)
Natural Computing
, vol.6
, Issue.4
, pp. 413-466
-
-
Kim, J.1
Bentley, P.J.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycross, J.6
-
16
-
-
0028201732
-
Tolerance, danger, and the extended family
-
P. Matzinger Tolerance, danger, and the extended family Annual Reviews in Immunology 12 1994 991 1045 (Pubitemid 24140436)
-
(1994)
Annual Review of Immunology
, vol.12
, pp. 991-1045
-
-
Matzinger, P.1
-
17
-
-
0032191916
-
An innate sense of danger
-
DOI 10.1006/smim.1998.0143
-
P. Matzinger An innate sense of danger Seminars in Immunology 10 1998 399 415 (Pubitemid 28499554)
-
(1998)
Seminars in Immunology
, vol.10
, Issue.5
, pp. 399-415
-
-
Matzinger, P.1
-
18
-
-
0037066427
-
The danger model: A renewed sense of self
-
P. Matzinger The danger model: a renewed sense of self Science 296 2002 301 304
-
(2002)
Science
, vol.296
, pp. 301-304
-
-
Matzinger, P.1
-
19
-
-
11144340471
-
An innately interesting decade of research in immunology
-
DOI 10.1038/nm1159
-
R. Germain An innately interesting decade of research in immunology Nature Medicine 10 2004 1307 1320 (Pubitemid 40022712)
-
(2004)
Nature Medicine
, vol.10
, Issue.12
, pp. 1307-1320
-
-
Germain, R.N.1
-
24
-
-
33750241323
-
BeeHiveAIS: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems
-
Springer-Verlag Berlin, Heidelberg pp. 623-632
-
H. Wedde, C. Timm, and M. Farooq BeeHiveAIS: a simple, efficient, scalable and secure routing framework inspired by artificial immune systems Proceedings of the PPSN IX, LNCS 4193 2006 Springer-Verlag Berlin, Heidelberg pp. 623-632
-
(2006)
Proceedings of the PPSN IX, LNCS 4193
-
-
Wedde, H.1
Timm, C.2
Farooq, M.3
-
25
-
-
34548068359
-
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
-
DOI 10.1145/1276958.1276973, Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
-
N. Mazhar, and M. Farooq Vulnerability analysis and security framework (BeeSec)for nature inspired MANET routing protocols Proceedings of the ACM GECCO'07, July 2007 102 109 (Pubitemid 47291489)
-
(2007)
Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
, pp. 102-109
-
-
Mazhar, N.1
Farooq, M.2
-
26
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
DOI 10.1007/s11276-004-4744-y
-
Y.-C. Hu, A. Perrig, and D.B. Johnson Ariadne: a secure on-demand routing protocol for ad hoc networks Wireless Networks 11 1-2 2005 21 38 (Pubitemid 40536374)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
27
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Imielinski Korth Kluwer Academic Publishers
-
D.B. Johnson, and D.A. Maltz Dynamic source routing in ad hoc wireless networks Imielinski Korth Mobile Computing 1996 Kluwer Academic Publishers 153 181
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
31
-
-
32444432940
-
BeeAdHoc: An energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior
-
DOI 10.1145/1068009.1068034, GECCO 2005 - Genetic and Evolutionary Computation Conference
-
H. Wedde, M. Farooq, T. Pannenbaecker, B. Vogel, C. Mueller, J. Meth, and R. Jeruschkat BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior Proceedings of the ACM GECCO'05 2005 153 160 (Pubitemid 43226282)
-
(2005)
GECCO 2005 - Genetic and Evolutionary Computation Conference
, pp. 153-160
-
-
Wedde, H.F.1
Farooq, M.2
Pannenbaecker, T.3
Vogel, B.4
Mueller, C.5
Meth, J.6
Jeruschkat, R.7
-
36
-
-
80053577026
-
-
Next Generation Intelligent Networks Research Center, May 2010
-
N. Mazhar, M. Farooq, A Hybrid AIS Model for Power Aware Secure Mobile Adhoc Networks Routing Protocols, Technical Report TR-nexGINRC-2010-59, Next Generation Intelligent Networks Research Center, http://nexginrc.org/ nexginrcAdmin/PublicationsFiles/TR-59-Nauman.pdf, May 2010.
-
A Hybrid AIS Model for Power Aware Secure Mobile Adhoc Networks Routing Protocols, Technical Report TR-nexGINRC-2010-59
-
-
Mazhar, N.1
Farooq, M.2
-
38
-
-
38149049152
-
BeeAIS: Artificial immune system security for nature inspired, MANET routing protocol, beeadhoc
-
Springer-Verlag
-
N. Mazhar, and M. Farooq BeeAIS: artificial immune system security for nature inspired, MANET routing protocol, beeadhoc Proceedings of the ICARIS'07, LNCS 4628 2007 Springer-Verlag 370 381
-
(2007)
Proceedings of the ICARIS'07, LNCS 4628
, pp. 370-381
-
-
Mazhar, N.1
Farooq, M.2
-
39
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
J. Broch, D.A. Maltz, D.B. Johnson, Y.C. Hu, and J. Jetcheva A performance comparison of multi-hop wireless ad hoc network routing protocols Proceedings of the ACM/IEEE MobiCom, October 1998
-
(1998)
Proceedings of the ACM/IEEE MobiCom, October
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.C.4
Jetcheva, J.5
-
40
-
-
57349103148
-
A sense of danger: Dendritic cells inspired artificial immune system (AIS) for MANET security
-
N. Mazhar, and M. Farooq A sense of danger: Dendritic cells inspired artificial immune system (AIS) for MANET security Proceedings of the ACM GECCO'08, July 2008
-
(2008)
Proceedings of the ACM GECCO'08, July
-
-
Mazhar, N.1
Farooq, M.2
-
42
-
-
33745804827
-
An artificial immune system approach to misbehavior detection in mobile ad-hoc networks
-
Lausanne, Switzerland, January
-
J.L. Boudec, and S. Sarafijanovic An artificial immune system approach to misbehavior detection in mobile ad-hoc networks Proceedings of the Bio-ADIT'04 Lausanne, Switzerland, January 2004 96 111
-
(2004)
Proceedings of the Bio-ADIT'04
, pp. 96-111
-
-
Boudec, J.L.1
Sarafijanovic, S.2
-
43
-
-
26844569805
-
An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks
-
DOI 10.1109/TNN.2005.853419
-
S. Sarafijanovic, J.L. Boudec, An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks, IEEE Transactions on Neural Networks 16(5) (2005) 1076-1087. (Pubitemid 41444613)
-
(2005)
IEEE Transactions on Neural Networks
, vol.16
, Issue.5
, pp. 1076-1087
-
-
Sarafijanovic, S.1
Le Boudec, J.-Y.2
-
44
-
-
35248825128
-
Danger theory: The link between AIS and IDS
-
Springer-Verlag pp. 147-155
-
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod Danger theory: the link between AIS and IDS Proceedings of the ICARIS'03, LNCS 2728 2003 Springer-Verlag pp. 147-155
-
(2003)
Proceedings of the ICARIS'03, LNCS 2728
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
46
-
-
80053570940
-
-
D. Project
-
D. Project, http://www.dangertheory.com.
-
-
-
-
49
-
-
26944469543
-
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
-
Springer-Verlag pp. 153-167
-
J. Greensmith, U. Aickelin, and S. Cayzer Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection Proceedings of the ICARIS'05, LNCS 3627 2005 Springer-Verlag pp. 153-167
-
(2005)
Proceedings of the ICARIS'05, LNCS 3627
-
-
Greensmith, J.1
Aickelin, U.2
Cayzer, S.3
-
50
-
-
35048854187
-
An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors
-
Springer-Verlag pp. 342-356
-
S. Sarafijanovic, and J.L. Boudec An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors Proceedings of the ICARIS'04, LNCS 3239 2004 Springer-Verlag pp. 342-356
-
(2004)
Proceedings of the ICARIS'04, LNCS 3239
-
-
Sarafijanovic, S.1
Boudec, J.L.2
-
51
-
-
33751021110
-
Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm
-
Artificial Immune Systems - 5th International Conference, ICARIS 2006. Proceedings
-
J. Kim, P. Bentley, C. Wallenta, M. Ahmed, and S. Hailes Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm Proceedings of ICARIS'06, LNCS 4163 2006 390 403 (Pubitemid 44744026)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4163
, pp. 390-403
-
-
Kim, J.1
Bentley, P.2
Wallenta, C.3
Ahmed, M.4
Hailes, S.5
|