-
2
-
-
0043035691
-
Direct measurement vs. indirect inference for determining network internal delays
-
K.G. Anagnostakis, and M.B. Greenwald Direct measurement vs. indirect inference for determining network internal delays Performance Evaluation 49 2002 165 176
-
(2002)
Performance Evaluation
, vol.49
, pp. 165-176
-
-
Anagnostakis, K.G.1
Greenwald, M.B.2
-
3
-
-
8344229909
-
A cluster-based security architecture for ad hoc networks
-
Hong Kong
-
M. Bechler, H. Hof, D. Kraft, A cluster-based security architecture for ad hoc networks, In: 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'04), Hong Kong, 2004, pp. 2393-2403.
-
(2004)
23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'04)
, pp. 2393-2403
-
-
Bechler, M.1
Hof, H.2
Kraft, D.3
-
4
-
-
84868474073
-
Performance of Security Mechanisms in Wireless Ad Hoc Networks
-
W.W. Smari, (Ed.) Nicosia, Cyprus
-
M. Becker, M. Drozda, S. Schaust, Performance of Security Mechanisms in Wireless Ad Hoc Networks, In: W.W. Smari, (Ed.), 22nd EUROPEAN Conference on Modelling and Simulation, Nicosia, Cyprus, 2008, pp. 1-6.
-
(2008)
22nd EUROPEAN Conference on Modelling and Simulation
, pp. 1-6
-
-
Becker, M.1
Drozda, M.2
Schaust, S.3
-
6
-
-
79959520290
-
On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks
-
R.V. Boppana, and X. Su On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks IEEE Transactions on Mobile Computing 10 2011 1162 1174
-
(2011)
IEEE Transactions on Mobile Computing
, vol.10
, pp. 1162-1174
-
-
Boppana, R.V.1
Su, X.2
-
7
-
-
34548043694
-
Trust-based security for wireless ad hoc and sensor networks
-
A. Boukerch, L. Xu, and K. EL-Khatib Trust-based security for wireless ad hoc and sensor networks Computer Communications 30 2007 2413 2427
-
(2007)
Computer Communications
, vol.30
, pp. 2413-2427
-
-
Boukerch, A.1
Xu, L.2
El-Khatib, K.3
-
9
-
-
58049119197
-
A simple graphical approach for understanding probabilistic inference in Bayesian networks
-
C.J. Butz, S. Hua, J. Chen, and H. Yao A simple graphical approach for understanding probabilistic inference in Bayesian networks Information Sciences 179 2009 699 716
-
(2009)
Information Sciences
, vol.179
, pp. 699-716
-
-
Butz, C.J.1
Hua, S.2
Chen, J.3
Yao, H.4
-
10
-
-
16244415598
-
Network tomography: Recent developments
-
R. Castro, M. Coates, G. Liang, R. Nowak, and B. Yu Network tomography: recent developments Statistical Science 19 2004 499 517
-
(2004)
Statistical Science
, vol.19
, pp. 499-517
-
-
Castro, R.1
Coates, M.2
Liang, G.3
Nowak, R.4
Yu, B.5
-
11
-
-
84855456018
-
On improving temporal and spatial mobility metrics for wireless ad hoc networks
-
E.R. Cavalcanti, and M.A. Spohn On improving temporal and spatial mobility metrics for wireless ad hoc networks Information Sciences 188 2012 182 197
-
(2012)
Information Sciences
, vol.188
, pp. 182-197
-
-
Cavalcanti, E.R.1
Spohn, M.A.2
-
12
-
-
58149523732
-
AdHoc Probe: End-to-end capacity probing in wireless ad hoc networks
-
L.J. Chen, T. Sun, G. Yang, M.Y. Sanadidi, and M. Gerla AdHoc Probe: end-to-end capacity probing in wireless ad hoc networks Wireless Networks 15 2009 111 126
-
(2009)
Wireless Networks
, vol.15
, pp. 111-126
-
-
Chen, L.J.1
Sun, T.2
Yang, G.3
Sanadidi, M.Y.4
Gerla, M.5
-
13
-
-
17144408406
-
Balancing security against performance in wireless ad hoc and sensor networks
-
September
-
C. Chigan, Y. Ye, L. Li, Balancing security against performance in wireless ad hoc and sensor networks, in: Proceedings of IEEE VTC 2004, vol. 7, September 2004, pp. 4735-4739.
-
(2004)
Proceedings of IEEE VTC 2004
, vol.7
, pp. 4735-4739
-
-
Chigan, C.1
Ye, Y.2
Li, L.3
-
16
-
-
80054804307
-
A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks
-
Tamil Nadu, India
-
N. Deb, M. Chakraborty, N. Chaki, A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks, in: 1st International Conference on Parallel, Distributed Computing Technologies and Applications, Tamil Nadu, India, 2011, pp. 169-179.
-
(2011)
1st International Conference on Parallel, Distributed Computing Technologies and Applications
, pp. 169-179
-
-
Deb, N.1
Chakraborty, M.2
Chaki, N.3
-
18
-
-
38549181478
-
A Multi-Scale tomographic algorithm for detecting and classifying traffic anomalies
-
S. Farraposo, P. Owezarski, E. Monteiro, A Multi-Scale tomographic algorithm for detecting and classifying traffic anomalies, In: IEEE International Conference on Communications, Glasgow, 2007, pp. 363-370.
-
(2007)
IEEE International Conference on Communications, Glasgow
, pp. 363-370
-
-
Farraposo, S.1
Owezarski, P.2
Monteiro, E.3
-
19
-
-
80052214999
-
An intelligent system for intrusion detection using outlier detection
-
MIT, Anna University Chennai
-
S. Ganapathy, N. Jaisankar, P. Yogesh, and A. Kannan An intelligent system for intrusion detection using outlier detection International Conference on Recent Trends in Information Technology (ICRTIT) 2011 MIT, Anna University Chennai 119 123
-
(2011)
International Conference on Recent Trends in Information Technology (ICRTIT)
, pp. 119-123
-
-
Ganapathy, S.1
Jaisankar, N.2
Yogesh, P.3
Kannan, A.4
-
21
-
-
0036670170
-
Mobility increases the capacity of ad hoc wireless networks
-
M. Grossglauser, and D. Tse Mobility increases the capacity of ad hoc wireless networks ACM/IEEE Trans. Network 10 2002 477 486
-
(2002)
ACM/IEEE Trans. Network
, vol.10
, pp. 477-486
-
-
Grossglauser, M.1
Tse, D.2
-
22
-
-
3042819089
-
Loss inference in wireless sensor networks based on data aggregation
-
Berkeley, California
-
G. Hartl, B. Li, Loss inference in wireless sensor networks based on data aggregation, in: Proc. of International Symposium on Information Processing in Sensor Networks, Berkeley, California, 2004, pp. 396-404.
-
(2004)
Proc. of International Symposium on Information Processing in Sensor Networks
, pp. 396-404
-
-
Hartl, G.1
Li, B.2
-
23
-
-
84868478945
-
Self-organization map and its application
-
T. Heizo, and F. Kikuro Self-organization map and its application Brain & Neural Networks 10 2003 147 157
-
(2003)
Brain & Neural Networks
, vol.10
, pp. 147-157
-
-
Heizo, T.1
Kikuro, F.2
-
26
-
-
70350560758
-
A novel intrusion detection scheme using support vector machine fuzzy network for mobile ad hoc networks
-
IEEE Computer Society Wuhan, China
-
L. Huike, and G. Daquan A novel intrusion detection scheme using support vector machine fuzzy network for mobile ad hoc networks Proc. The Second Pacific-Asia Conference on Web Mining and Web-based Application 2009 IEEE Computer Society Wuhan, China 47 50
-
(2009)
Proc. the Second Pacific-Asia Conference on Web Mining and Web-based Application
, pp. 47-50
-
-
Huike, L.1
Daquan, G.2
-
27
-
-
38049032984
-
Architecture for data collection in database intrusion detection systems
-
X. Jin, and S.L. Osborn Architecture for data collection in database intrusion detection systems Lecture Notes in Computer Science 4721 2007 96 107
-
(2007)
Lecture Notes in Computer Science
, vol.4721
, pp. 96-107
-
-
Jin, X.1
Osborn, S.L.2
-
30
-
-
48749127817
-
Local anomaly detection for mobile network monitoring
-
P. Kumpulainen, and Kimmo Hatonen Local anomaly detection for mobile network monitoring Information Sciences 178 2008 3840 3859
-
(2008)
Information Sciences
, vol.178
, pp. 3840-3859
-
-
Kumpulainen, P.1
Hatonen, K.2
-
31
-
-
33646862515
-
MANET simulation studies: The incredibles
-
October
-
S. Kurkowski, T. Camp, M. Colagrosso, MANET simulation studies: the incredibles, in: Proc. of Mobile Computing and Communication Review, vol. 9, October 2005, pp. 50-61.
-
(2005)
Proc. of Mobile Computing and Communication Review
, vol.9
, pp. 50-61
-
-
Kurkowski, S.1
Camp, T.2
Colagrosso, M.3
-
34
-
-
84967496010
-
Network tomography: A review and recent developments
-
Fan Koul Imperial College Press London
-
E. Lawrence, G. Michailidis, V.N. Nair, and X. Bowei Network tomography: a review and recent developments Fan Koul Frontiers in Statistics 2006 Imperial College Press London 345 366
-
(2006)
Frontiers in Statistics
, pp. 345-366
-
-
Lawrence, E.1
Michailidis, G.2
Nair, V.N.3
Bowei, X.4
-
35
-
-
80052938422
-
A lightweight anonymous routing protocol without public key for wireless ad hoc networks
-
C.T. Li, and M.S. Hwang A lightweight anonymous routing protocol without public key for wireless ad hoc networks Information Sciences 181 2011 5333 5347
-
(2011)
Information Sciences
, vol.181
, pp. 5333-5347
-
-
Li, C.T.1
Hwang, M.S.2
-
37
-
-
0041663418
-
Unicast-based inference of network link delay distributions with finite mixture models
-
S. Meng-Fu, and O. Alfred Unicast-based inference of network link delay distributions with finite mixture models IEEE Transactions on Signal Processing 51 2003 2219 2228
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, pp. 2219-2228
-
-
Meng-Fu, S.1
Alfred, O.2
-
38
-
-
84868500354
-
Active network tomography and the design of efficient probing experiments
-
Santa Fe, NM
-
D. Michailidis, V.N. Nair, Active network tomography and the design of efficient probing experiments, in: Mathematical Methods in Reliability Conference, Santa Fe, NM, 2004, pp. 137-141.
-
(2004)
Mathematical Methods in Reliability Conference
, pp. 137-141
-
-
Michailidis, D.1
Nair, V.N.2
-
39
-
-
39149117050
-
A game-theoretic intrusion detection model for mobile ad hoc networks
-
H. Otrok, N. Mohammed, W. Lingyu, M. Debbabi, and P. Bhattacharya A game-theoretic intrusion detection model for mobile ad hoc networks Computer Communications 31 2008 708 721
-
(2008)
Computer Communications
, vol.31
, pp. 708-721
-
-
Otrok, H.1
Mohammed, N.2
Lingyu, W.3
Debbabi, M.4
Bhattacharya, P.5
-
40
-
-
34548337065
-
Testing intrusion detection systems in MANET: A comprehensive study
-
H. Otrok, J. Paquet, M. Debbabi, P. Bhattacharya, Testing intrusion detection systems in MANET: a comprehensive study, in: Proc. of IEEE 5th Annual Conference on Communication Networks and Services Research (CNSR'07), 2007, pp. 364-371.
-
(2007)
Proc. of IEEE 5th Annual Conference on Communication Networks and Services Research (CNSR'07)
, pp. 364-371
-
-
Otrok, H.1
Paquet, J.2
Debbabi, M.3
Bhattacharya, P.4
-
42
-
-
78651412861
-
A novel intrusion detection system for MANETS
-
Athens, Greece
-
C. Panos, C. Xenakis, I. Stavrakakis, A novel intrusion detection system for MANETS, in: Proc. International Conference on Security and Cryptography, Athens, Greece, 2010, pp. 1-10.
-
(2010)
Proc. International Conference on Security and Cryptography
, pp. 1-10
-
-
Panos, C.1
Xenakis, C.2
Stavrakakis, I.3
-
43
-
-
36448978463
-
Passive tomography of a 3G network: Challenges and opportunities
-
F. Ricciato, F. Vacirca, W. Fleischer, J. Motz, M. Rupp, Passive tomography of a 3G network: challenges and opportunities, in: INFOCOM 2006, 2006, pp. 116-122.
-
(2006)
INFOCOM 2006
, pp. 116-122
-
-
Ricciato, F.1
Vacirca, F.2
Fleischer, W.3
Motz, J.4
Rupp, M.5
-
46
-
-
77958466872
-
Prevention of wormhole attacks in mobile ad hoc networks by intrusion detection nodes
-
Springer Verlag Beijing, China
-
M.Y. Su, and K.L. Chiang Prevention of wormhole attacks in mobile ad hoc networks by intrusion detection nodes Proc. 5th International Conference on Wireless Algorithms, Systems, and Applications 2010 Springer Verlag Beijing, China 253 260
-
(2010)
Proc. 5th International Conference on Wireless Algorithms, Systems, and Applications
, pp. 253-260
-
-
Su, M.Y.1
Chiang, K.L.2
-
49
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
VA
-
C.Y. Tseng, P. Balasubramanyam, C. Ko, et al., A specification-based intrusion detection system for AODV, In: Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks, VA, 2003, pp. 125-134.
-
(2003)
Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 125-134
-
-
Tseng, C.Y.1
Balasubramanyam, P.2
Ko, C.3
-
50
-
-
78649400157
-
Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption
-
S. Umang, B.V.R. Reddy, and M.N. Hoda Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption IET Communications 4 2010 2084 2094
-
(2010)
IET Communications
, vol.4
, pp. 2084-2094
-
-
Umang, S.1
Reddy, B.V.R.2
Hoda, M.N.3
-
51
-
-
0001073106
-
Network tomography: Estimating source-destination traffic intensities from link data
-
Y. Vardi Network tomography: estimating source-destination traffic intensities from link data Journal of the American Statistical Association 91 1996 365 377
-
(1996)
Journal of the American Statistical Association
, vol.91
, pp. 365-377
-
-
Vardi, Y.1
-
53
-
-
49049088114
-
Inference of wireless link performance in MANET
-
IEEE CS Press, Gyeongju, Republic of Korea
-
BZ. Wang, Y. Wang, W. Wang, Inference of wireless link performance in MANET, in: Proc. International Conf. on Convergence Information Technology, IEEE CS Press, Gyeongju, Republic of Korea, 2007, pp. 1481-1487.
-
(2007)
Proc. International Conf. on Convergence Information Technology
, pp. 1481-1487
-
-
Wang, B.Z.1
Wang, Y.2
Wang, W.3
-
54
-
-
34548829658
-
Mobile ad hoc network delay tomography
-
Xiamen, Chian
-
W. Wang, W. Cai, B. Wang, Y. Li, G.Tian, Mobile ad hoc network delay tomography, in: Proc. IEEE International Workshop on Anti-counterfeiting Security, Identification, Xiamen, Chian, 2007, pp. 365-370.
-
(2007)
Proc. IEEE International Workshop on Anti-counterfeiting Security, Identification
, pp. 365-370
-
-
Wang, W.1
Cai, W.2
Wang, B.3
Li, Y.4
Tian, G.5
-
55
-
-
70449112645
-
A novel mobility model based on semi-random circular movement in mobile ad hoc networks
-
W. Wang, X. Guan, B. Wang, and Y. Wang A novel mobility model based on semi-random circular movement in mobile ad hoc networks Information Sciences 180 2010 399 413
-
(2010)
Information Sciences
, vol.180
, pp. 399-413
-
-
Wang, W.1
Guan, X.2
Wang, B.3
Wang, Y.4
-
56
-
-
79251595976
-
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
-
C. Xenakis, C. Panos, and I. Stavrakakis A comparative evaluation of intrusion detection architectures for mobile ad hoc networks Computers & Security 30 2011 63 80
-
(2011)
Computers & Security
, vol.30
, pp. 63-80
-
-
Xenakis, C.1
Panos, C.2
Stavrakakis, I.3
-
58
-
-
78651590884
-
Ad hoc network measurement based on network tomography: Theory, technique, and application
-
Y. Yao, and W. Cai Ad hoc network measurement based on network tomography: theory, technique, and application Journal of Networks 5 2010 666 674
-
(2010)
Journal of Networks
, vol.5
, pp. 666-674
-
-
Yao, Y.1
Cai, W.2
-
60
-
-
0034546898
-
Intrusion detection in wireless ad hoc networks
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad hoc networks, in: Proc. of the MOBICOM 2000, ACM, 2000, pp. 275-283.
-
(2000)
Proc. of the MOBICOM 2000, ACM
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
|