-
1
-
-
74849118115
-
Military tactics in agentbased sinkhole attack detection for wireless ad hoc networks
-
Stefan K. Stafrace, Nick Antonopoulos" Military tactics in agentbased sinkhole attack detection for wireless ad hoc networks" Computer Communications 33 (2010) 619-638
-
(2010)
Computer Communications
, vol.33
, pp. 619-638
-
-
Stafrace, S.K.1
Antonopoulos, N.2
-
3
-
-
33845889547
-
Detecting unauthorized and compromised nodes in mobile ad-hoc networks
-
April
-
Komninos N.,Vergados D. and Douligeris C., "Detecting Unauthorized and Compromised Nodes in Mobile Ad-Hoc Networks", Journal in Ad Hoc Networks, Elsevier Press, Vol. 5, (3), April 2007, pp. 289-298.
-
(2007)
Journal in Ad Hoc Networks, Elsevier Press
, vol.5
, Issue.3
, pp. 289-298
-
-
Komninos, N.1
Vergados, D.2
Douligeris, C.3
-
4
-
-
15844404847
-
Secure ad-hoc on-demand distance vector (SAODV)routing
-
October 8
-
M.G. Zapata, "Secure ad-hoc on-demand distance vector (SAODV)routing", IETF MANET Mailing List, October 8, 2001.
-
(2001)
IETF MANET Mailing List
-
-
Zapata, M.G.1
-
6
-
-
24744436723
-
Intrusion detection techniques for mobile wireless networks
-
Zhang Y, Lee W, and Huang Y, "Intrusion Detection Techniques for Mobile Wireless Networks", ACM WINET 2003.
-
(2003)
ACM WINET
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
7
-
-
4544258840
-
A cooperative intrusion detection system for ad hoc networks
-
October 31, Fairfax, Virginia
-
Yi-an Huang , Wenke Lee, A cooperative intrusion detection system for ad hoc networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October 31, 2003, Fairfax, Virginia .
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
-
-
Huang, Y.-A.1
Lee, W.2
-
8
-
-
4143084830
-
SVM-based intrusion detection system for wireless ad hoc networks
-
Orlando, Florida, USA
-
Deng H., Zeng Q., Agrawal D.P.: SVM-based Intrusion Detection System for Wireless Ad Hoc Networks. In: Proceedings of the IEEE Vehicular Technology Conference (VTC03), pp.2147-2151. Orlando, Florida, USA (2003).
-
(2003)
Proceedings of the IEEE Vehicular Technology Conference (VTC03)
, pp. 2147-2151
-
-
Deng, H.1
Zeng, Q.2
Agrawal, D.P.3
-
9
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
R. Poovendran, L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, ACM Journal on Wireless Networks (WINET), 13 (1) (2007) 27-59
-
(2007)
ACM Journal on Wireless Networks (WINET)
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
10
-
-
74149089249
-
A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks
-
Ming-Yang Su " A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks", computer & security29 journal(2010),208-224
-
(2010)
Computer & security29 Journal
, pp. 208-224
-
-
Su, M.-Y.1
-
12
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Y.-C. Hu, D.B. Johnson, A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks", WMCSA (2002) 3-13.
-
(2002)
WMCSA
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
13
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: "a secure on-demand routing protocol for ad hoc networks", MobiCOM (2002) 12-23.
-
(2002)
MobiCOM
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
33747437914
-
Flooding attack and defence in ad hoc networks
-
Yi P., Hou Y.F., Zhong Y., Zhang S., Dai Z. " Flooding Attack and Defence in Ad hoc Networks", In: Systems Engineering and Electronics, Vol. 17, No. 2, pp. 410-416 (2006).
-
(2006)
Systems Engineering and Electronics
, vol.17
, Issue.2
, pp. 410-416
-
-
Yi, P.1
Hou, Y.F.2
Zhong, Y.3
Zhang, S.4
Dai, Z.5
-
16
-
-
52249095096
-
On securingmanet routing protocol against control packet dropping
-
Istanbul, Turkey
-
Djenouri D., Mahmoudi O., Bouamama M., Llewellyn-Jones D. and Merabti M. "On SecuringMANET Routing Protocol Against Control Packet Dropping", In: Proceedings of IEEE International conference on Pervasive Services (ICPS' 07), pp. 100-108, Istanbul, Turkey (2007).
-
(2007)
Proceedings of IEEE International Conference on Pervasive Services (ICPS' 07)
, pp. 100-108
-
-
Djenouri, D.1
Mahmoudi, O.2
Bouamama, M.3
Llewellyn-Jones, D.4
Merabti, M.5
-
17
-
-
77950022458
-
A cooperative-sinkhole detection method for rmobile ad hoc networks
-
Gisung Kim?, YounggooHan,SehunKim" A cooperative-sinkhole detection method for rmobile ad hoc networks",in Int. J. Electron. Commun. (AEÜ) 64 (2010) 390-397
-
(2010)
Int. J. Electron. Commun. (AEÜ)
, vol.64
, pp. 390-397
-
-
Kim, G.1
Han, Y.2
Kim, S.3
-
18
-
-
53749101677
-
LIDF: Layered intrusion detection framework for ad-hoc networks
-
N.Komninos, C.Douligeris, "LIDF: Layered intrusion detection framework for ad-hoc networks", Ad Hoc Networks 7 journal,(2009) 171-181
-
(2009)
Ad Hoc Networks 7 Journal
, pp. 171-181
-
-
Komninos, N.1
Douligeris, C.2
-
19
-
-
3042514639
-
Fuzzy data mining and genetic algorithms applied to intrusion detection
-
Baltimore, MD, October
-
Bridges, Susan M., and Rayford M. Vaughn, "Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection" Proceedings of the Twenty-third National Information Systems Security Conference, Baltimore, MD, October 2000.
-
(2000)
Proceedings of the Twenty-third National Information Systems Security Conference
-
-
Bridges Susan, M.1
Vaughn, R.M.2
-
20
-
-
0027601884
-
ANFIS: Adaptive-network-based fuzzy inference systems
-
Jang R. and Susan J., "ANFIS: Adaptive-Network-based Fuzzy Inference Systems", IEEE Transactions on Systems, Man, and Cybernetics,23(3), 665-685, 1993.
-
(1993)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.23
, Issue.3
, pp. 665-685
-
-
Jang, R.1
Susan, J.2
-
21
-
-
70349749980
-
A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks
-
E.Ayday, F.Fekri, " A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks", journal of Ad Hoc Networks 8 (2010) 181-192
-
(2010)
Journal of Ad Hoc Networks
, vol.8
, pp. 181-192
-
-
Ayday, E.1
Fekri, F.2
-
22
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E. Belding-Royer, "A secure routing protocol for ad hoc networks", ICNP (2002) 78-87.
-
(2002)
ICNP
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
23
-
-
78149465598
-
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
-
Ming-Yang Su, "Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems", journal of Computer Communications 34 (2011) 107-117
-
(2011)
Journal of Computer Communications
, vol.34
, pp. 107-117
-
-
Su, M.-Y.1
-
24
-
-
80053560746
-
A hybrid artificial immune system(ais) model for power aware secure mobile ad-hoc networks(manets)routing protocols
-
N. Mazhara,?, M.Farooq" A hybrid artificial immune system(AIS) model for power aware secure Mobile Ad-Hoc Networks(MANETs)routing protocols", Applied Soft Computing xxx (2011) xxx-xxx.
-
(2011)
Applied Soft Computing
, vol.30
-
-
Mazhara, N.1
Farooq, M.2
-
25
-
-
39149119287
-
Collaborative techniques for intrusion detection in mobile ad-hoc networks
-
N. Marchang, R. Datta" Collaborative techniques for intrusion detection in mobile ad-hoc networks", Ad Hoc Networks 6 (2008) 508-523
-
(2008)
Ad Hoc Networks
, vol.6
, pp. 508-523
-
-
Marchang, N.1
Datta, R.2
-
26
-
-
79955571614
-
Distributed intrusion detection in the presence of correlated sensor readings: Signal-space and communication-complexity view-point
-
N.E. Venkatesan, Tarun Agarwal, V. Lalitha, P. Vijay Kumar" Distributed intrusion detection in the presence of correlated sensor readings: Signal-space and communication-complexity view-point", Ad Hoc Networks 9 (2011) 1015-1027
-
(2011)
Ad Hoc Networks
, vol.9
, pp. 1015-1027
-
-
Venkatesan, N.E.1
Agarwal, T.2
Lalitha, V.3
Vijay Kumar, P.4
-
27
-
-
79251595976
-
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
-
e8 0
-
C.Xenakis, C.Panos, I. Stavrakakis" A comparative evaluation of intrusion detection architectures for mobile ad hoc networks", computers & s e c u rity 3 0 ( 2 0 1 1 ) 6 3 e8 0
-
(2011)
Computers & Security
, vol.30
, pp. 63
-
-
Xenakis, C.1
Panos, C.2
Stavrakakis, I.3
-
28
-
-
84876372336
-
-
http://www.cs.Waikato.ac.nz/ml/weka
-
-
-
|