-
1
-
-
78751641756
-
A context adaptive intrusion detection system for MANET
-
B.-C. Cheng, and R.-Y. Tseng A context adaptive intrusion detection system for MANET Computer Communications 34 2011 310 318
-
(2011)
Computer Communications
, vol.34
, pp. 310-318
-
-
Cheng, B.-C.1
Tseng, R.-Y.2
-
3
-
-
77953095994
-
Black-hole attack in mobile ad hoc networks
-
ACM New York, NY, USA
-
M. Al-Shurman, S.-M. Yoo, and S. Park Black-hole attack in mobile ad hoc networks Proceedings of the 42nd Annual Southeast Regional Conference, ACM-SE 42 2004 ACM New York, NY, USA 96 97
-
(2004)
Proceedings of the 42nd Annual Southeast Regional Conference, ACM-SE 42
, pp. 96-97
-
-
Al-Shurman, M.1
Yoo, S.-M.2
Park, S.3
-
4
-
-
24144437206
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
P. Ning, and K. Sun How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols Ad Hoc Networks 3 2005 795 819
-
(2005)
Ad Hoc Networks
, vol.3
, pp. 795-819
-
-
Ning, P.1
Sun, K.2
-
5
-
-
52249095096
-
On securing MANET routing protocol against control packet dropping
-
IEEE Computer Society CA, USA
-
D. Djenouri, O. Mahmoudi, M. Bouamama, D. Llewellyn-Jones, and M. Merabti On securing MANET routing protocol against control packet dropping Proceedings of the International Conference on Pervasive Services 2007 IEEE Computer Society CA, USA 100 108
-
(2007)
Proceedings of the International Conference on Pervasive Services
, pp. 100-108
-
-
Djenouri, D.1
Mahmoudi, O.2
Bouamama, M.3
Llewellyn-Jones, D.4
Merabti, M.5
-
6
-
-
33747437914
-
Flooding attack and defence in ad hoc networks
-
P. Yi, Y.F. Hou, Y. Zhong, S. Zhang, and Z. Dai Flooding attack and defence in ad hoc networks Journal of Systems Engineering and Electronics 17 2006 410 416
-
(2006)
Journal of Systems Engineering and Electronics
, vol.17
, pp. 410-416
-
-
Yi, P.1
Hou, Y.F.2
Zhong, Y.3
Zhang, S.4
Dai, Z.5
-
7
-
-
51149107246
-
Intrusion detection in mobile ad hoc networks using classification algorithms
-
Springer, Palma de Mallorca, Spain
-
A. Mitrokotsa, M. Tsagkaris, C. Douligeris, Intrusion detection in mobile ad hoc networks using classification algorithms, in: Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Springer, Palma de Mallorca, Spain, 2008, pp. 133-144.
-
(2008)
Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop
, pp. 133-144
-
-
Mitrokotsa, A.1
Tsagkaris, M.2
Douligeris, C.3
-
8
-
-
2642515264
-
NIST Special Publication on Intrusion Detection Systems
-
National Institute of Standards and Technologies
-
R. Bace, P. Mell, NIST Special Publication on Intrusion Detection Systems, Technical Report, National Institute of Standards and Technologies, 2001.
-
(2001)
Technical Report
-
-
Bace, R.1
Mell, P.2
-
10
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
ACM New York, NY, USA
-
Y. Zhang, and W. Lee Intrusion detection in wireless ad-hoc networks Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000 ACM New York, NY, USA 275 283
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
11
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y. Zhang, W. Lee, and Y. Huang Intrusion detection techniques for mobile wireless networks Wireless Networks 9 2003 545 556
-
(2003)
Wireless Networks
, vol.9
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
12
-
-
4544258840
-
A cooperative intrusion detection system for ad hoc networks
-
ACM New York, NY, USA
-
Y. Huang, and W. Lee A cooperative intrusion detection system for ad hoc networks Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, SASN '03 2003 ACM New York, NY, USA 135 147
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN '03
, pp. 135-147
-
-
Huang, Y.1
Lee, W.2
-
13
-
-
34548323745
-
Attack analysis and detection for ad hoc routing protocols
-
E. Jonsson, A. Valdes, M. Almgren, Lecture Notes in Computer Science Springer Berlin/Heidelberg
-
Y.-a. Huang, and W. Lee Attack analysis and detection for ad hoc routing protocols E. Jonsson, A. Valdes, M. Almgren, Proceedings of the Recent Advances in Intrusion Detection Lecture Notes in Computer Science vol. 3224 2004 Springer Berlin/Heidelberg 125 145
-
(2004)
Proceedings of the Recent Advances in Intrusion Detection
, vol.3224 VOL.
, pp. 125-145
-
-
Huang, Y.-A.1
Lee, W.2
-
17
-
-
78149465598
-
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
-
M.-Y. Su Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems Computer Communications 34 2011 107 117
-
(2011)
Computer Communications
, vol.34
, pp. 107-117
-
-
Su, M.-Y.1
-
19
-
-
84856352171
-
Power-aware intrusion detection in mobile ad hoc networks
-
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer Berlin/Heidelberg
-
S. Sen, J.A. Clark, and J.E. Tapiador Power-aware intrusion detection in mobile ad hoc networks Proceeding of the Ad Hoc Networks Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering vol. 28 2010 Springer Berlin/Heidelberg 224 239
-
(2010)
Proceeding of the Ad Hoc Networks
, vol.28 VOL.
, pp. 224-239
-
-
Sen, S.1
Clark, J.A.2
Tapiador, J.E.3
-
20
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. Burges A tutorial on support vector machines for pattern recognition Data Mining and Knowledge Discovery 2 1998 121 167
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, pp. 121-167
-
-
Burges, C.1
-
22
-
-
74949104861
-
Applying genetic programming to intrusion detection
-
West Lafayette, IN
-
G.S. Mark Crosbie, Applying genetic programming to intrusion detection, in: Proceedings of the AAAI Fall Symposium on Artificial Intelligence, COAST Publications, West Lafayette, IN, 1995, pp. 1-8.
-
(1995)
Proceedings of the AAAI Fall Symposium on Artificial Intelligence, COAST Publications
, pp. 1-8
-
-
Mark Crosbie, G.S.1
-
25
-
-
84856226719
-
An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier
-
B. Kavitha, D.S. Karthikeyan, and P.S. Maybell An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier Knowledge-Based Systems 28 2012 88 96
-
(2012)
Knowledge-Based Systems
, vol.28
, pp. 88-96
-
-
Kavitha, B.1
Karthikeyan, D.S.2
Maybell, P.S.3
-
26
-
-
79952917584
-
A functional framework to evade network IDS
-
IEEE Koloa, Hawaii, USA
-
S. Pastrana, A. Orfila, and A. Ribagorda A functional framework to evade network IDS Proceedings of the 44th Hawaii International Conference on System Sciences 2011 IEEE Koloa, Hawaii, USA 1 10
-
(2011)
Proceedings of the 44th Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Pastrana, S.1
Orfila, A.2
Ribagorda, A.3
-
27
-
-
0031652485
-
GloMoSim: A library for parallel simulation of large-scale wireless networks
-
IEEE Banff, Alberta, Canada
-
X. Zeng, R. Bagrodia, and M. Gerla GloMoSim: a library for parallel simulation of large-scale wireless networks Proceedings of the 12th Workshop on Parallel and Distributed Simulations 1998 IEEE Banff, Alberta, Canada 154 161
-
(1998)
Proceedings of the 12th Workshop on Parallel and Distributed Simulations
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
29
-
-
34247332710
-
Measuring intrusion detection capability: An information-theoretic approach
-
Computer and Communications Security ACM New York, NY, USA
-
G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skorić Measuring intrusion detection capability: an information-theoretic approach Proceedings of the 2006 ACM Symposium on Information Computer and Communications Security 2006 ACM New York, NY, USA 90 101
-
(2006)
Proceedings of the 2006 ACM Symposium on Information
, pp. 90-101
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skorić, B.5
-
32
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
Morgan Kaufmann Publishers Inc. San Francisco, CA, USA
-
R. Kohavi A study of cross-validation and bootstrap for accuracy estimation and model selection Proceedings of the International Joint Conferences on Artificial Intelligence vol. 2 1995 Morgan Kaufmann Publishers Inc. San Francisco, CA, USA 1137 1145
-
(1995)
Proceedings of the International Joint Conferences on Artificial Intelligence
, vol.2 VOL.
, pp. 1137-1145
-
-
Kohavi, R.1
|