-
1
-
-
84888337092
-
-
IETF Mobile Ad-Hoc Networks Working Group (MANET), IETF
-
IETF Mobile Ad-Hoc Networks Working Group (MANET), IETF website www.ietf.org/dyn/wg/charter/manet-charter.html
-
-
-
-
2
-
-
84888379418
-
-
IETF Ad-Hoc Networks Autoconfigurations (autoconf) Working Group, IETF
-
IETF Ad-Hoc Networks Autoconfigurations (autoconf) Working Group, IETF website http://datatracker.ietf.org/wg/autoconf/charter/
-
-
-
-
6
-
-
0033293396
-
Towards a taxonomy of intrusion detection systems
-
April
-
H. Debar, M. Dacier and A.Wespi, "Towards a Taxonomy of Intrusion Detection Systems", Computer Network Journal, special issue on Computer Network Security, Vol.31, No.8, pp 805-822, April 1999.
-
(1999)
Computer Network Journal, Special Issue on Computer Network Security
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
7
-
-
0034226287
-
A revised taxonomy for intrusion detection systems
-
July
-
H. Debar, M. Dacier and A.Wespi, "A Revised Taxonomy for Intrusion Detection Systems", Annals of Telecommunications, Vol.55, No.7, pp 361-378, July 2000.
-
(2000)
Annals of Telecommunications
, vol.55
, Issue.7
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
8
-
-
15944386956
-
Battery-based intrusion detection: A first line of defense
-
453, Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
-
G.A. Jacoby, R.Marchany and N.J. Davis, "Battery-based intrusion detection as first line of defense", Proc. Annual IEEE Information Assurance Workshop, pp 272-279, 2004. (Pubitemid 40442802)
-
(2004)
Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
, pp. 272-279
-
-
Jacoby, G.A.1
Marchany, R.2
Davis IV, N.J.3
-
9
-
-
36849062699
-
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
-
DOI 10.1109/MWC.2007.4396943
-
B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Communications Magazine, special issue on Security in Wireless Mobile Ad Hoc and Sensor Networks, Vol.14, No.5, pp. 56-63, Oct. 2007. (Pubitemid 350231654)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 56-63
-
-
Sun, B.1
Osborne, L.2
Xiao, Y.3
Guizani, S.4
-
11
-
-
84880119198
-
A comprehensive survey of anomaly based intrusion detection systems in MANETs
-
D. Kheyri and M. Karami, "A comprehensive survey of anomaly based intrusion detection systems in MANETs", Journal of Computer and Information Science, Vol. 5, No. 4, pp. 132-139, 2012.
-
(2012)
Journal of Computer and Information Science
, vol.5
, Issue.4
, pp. 132-139
-
-
Kheyri, D.1
Karami, M.2
-
12
-
-
79960357664
-
A comprehensive survey on intrusion detection in manet
-
S. Sahu and K. Shandilya, "A Comprehensive Survey on Intrusion Detection in MANET", International Journal of Information Technology and Knowledge Management, Vol.2, No. 2, pp. 305-310, 2010.
-
(2010)
International Journal of Information Technology and Knowledge Management
, vol.2
, Issue.2
, pp. 305-310
-
-
Sahu, S.1
Shandilya, K.2
-
13
-
-
84888324782
-
Countermeasures of network layer attacks in manets
-
M.Ghonge, P.M.Jawandhiya and M.S.Ali, "Countermeasures of Network Layer Attacks in MANETs", International Journal of Computer Applications, Special Issue on Network Security and Cryptography, NSC, 2011.
-
(2011)
International Journal of Computer Applications, Special Issue on Network Security and Cryptography, NSC
-
-
Ghonge, M.1
Jawandhiya, P.M.2
Ali, M.S.3
-
14
-
-
80054804307
-
A state-of-The-art survey on IDS for mobile ad-hoc networks and wireless mesh networks
-
N. Deb, M.Chakraborty and N. Chaki, "A state-of-the-art survey on IDS for mobile ad-hoc networks and wireless mesh networks", Proceedings International Conference on Parallel, Distributed Computing Technologies and Applications, PDCTA 2011, pp. 169-179, 2011.
-
(2011)
Proceedings International Conference on Parallel, Distributed Computing Technologies and Applications, PDCTA 2011
, pp. 169-179
-
-
Deb, N.1
Chakraborty, M.2
Chaki, N.3
-
15
-
-
84888329033
-
Mobile ad hoc networks: A comprehensive study and survey on intrusion detection
-
S.Gangwar, "Mobile Ad Hoc Networks: A Comprehensive Study and Survey on Intrusion Detection", International Journal of Engineering Research and Applications (IJERA), Vol.2, No.1, pp 607-612, 2012.
-
(2012)
International Journal of Engineering Research and Applications (IJERA)
, vol.2
, Issue.1
, pp. 607-612
-
-
Gangwar, S.1
-
16
-
-
84901395581
-
A survey of black hole attacks in wireless mobile ad hoc networks
-
F.Tseng, L. Chou and H.Chao, "A Survey of Black Hole Attacks in Wireless Mobile Ad Hoc Networks", Journal on Human-Centric Computing and Information Sciences, Springer, Vol.1, No.4, pp. 1-16, 2011.
-
(2011)
Journal on Human-Centric Computing and Information Sciences, Springer
, vol.1
, Issue.4
, pp. 1-16
-
-
Tseng, F.1
Chou, L.2
Chao, H.3
-
20
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
B. Johnson and A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks", Proc. Mobile Computing Journal, Vol.353, pp 153-181, 1996.
-
(1996)
Proc. Mobile Computing Journal
, vol.353
, pp. 153-181
-
-
Johnson, B.1
Maltz, A.2
-
21
-
-
35348879637
-
The sleep deprivation attack in sensor networks: Analysis and methods of defence
-
M. Pirrete and R. Brooks, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defence", International Journal of Distributed Sensor Networks, Vol.2, No.3, pp 267-287, 2006.
-
(2006)
International Journal of Distributed Sensor Networks
, vol.2
, Issue.3
, pp. 267-287
-
-
Pirrete, M.1
Brooks, R.2
-
23
-
-
34548048170
-
Detecting blackhole attack on aodvbased mobile ad hoc networks by dynamic learning method
-
November
-
S. Kurosawa and A. Jamalipour, "Detecting Blackhole Attack on AODVbased Mobile Ad Hoc Networks by Dynamic Learning method", International Journal of Network Security, Vol.5, No.3, pp 338-345, November 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 338-345
-
-
Kurosawa, S.1
Jamalipour, A.2
-
24
-
-
50449103864
-
A mechanism for detection of gray hole attacks in mobile ad hoc networks
-
Singapore, Dec.
-
J.Sen, M.Chandra, S.G. Harihara, H.Reddy and P.Balamuralidhar, "A Mechanism for Detection of Gray Hole Attacks in Mobile Ad Hoc Networks", Proc. IEEE International Conference on Information Communication and Signal Processing ICICS, Singapore, Dec. 2007.
-
(2007)
Proc. IEEE International Conference on Information Communication and Signal Processing ICICS
-
-
Sen, J.1
Chandra, M.2
Harihara, S.G.3
Reddy, H.4
Balamuralidhar, P.5
-
28
-
-
48349133930
-
A distributed protocol for detection of packet dropping attack in mobile ad hoc networks
-
J. Sen, M. Chandra, P. Balamurlidhar, S.G. Harihara and H.Reddy, "A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad hoc Networks", Proc. IEEE Conference on Telecommunication and Malaysian International Conference on Communication (ICT-MICC), 2007
-
(2007)
Proc. IEEE Conference on Telecommunication and Malaysian International Conference on Communication (ICT-MICC)
-
-
Sen, J.1
Chandra, M.2
Balamurlidhar, P.3
Harihara, S.G.4
Reddy, H.5
-
31
-
-
33144467802
-
Secure data communication in mobile ad hoc networks
-
DOI 10.1109/JSAC.2005.861392
-
P. Papadimitratos and Z.Haas, "Secure Data Communication in Mobile Ad Hoc Networks", IEEE Journal on Selected Areas in Communications, Vol.24, No.2, pp 343-356, Feb. 2006. (Pubitemid 43269754)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 343-356
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
32
-
-
38049004945
-
Detection of packet forwarding misbehaviour in mobile ad hoc networks
-
Portugal, June
-
O.F. Gonzalez-Duque, M. Howarth and G. Pavlou, "Detection of Packet Forwarding Misbehaviour in Mobile Ad hoc Networks", Proc. International Conference on Wired/Wireless Internet Communications (WWIC 2007), pp 302-314, Portugal, June 2007.
-
(2007)
Proc. International Conference on Wired/Wireless Internet Communications (WWIC 2007)
, pp. 302-314
-
-
Gonzalez-Duque, O.F.1
Howarth, M.2
Pavlou, G.3
-
33
-
-
70449436623
-
Detection and accusation of packet forwarding misbehaviour in mobile ad hoc networks
-
June
-
O.F. Gonzalez-Duque, G. Ansa, M. Howarth and G. Pavlou, "Detection and Accusation of Packet Forwarding Misbehaviour in Mobile Ad hoc Networks", Journal of Internet Engineering, Vol.2, No.8, pp 181-192, June 2008.
-
(2008)
Journal of Internet Engineering
, vol.2
, Issue.8
, pp. 181-192
-
-
Gonzalez-Duque, O.F.1
Ansa, G.2
Howarth, M.3
Pavlou, G.4
-
34
-
-
70449334196
-
Adaptive misbehaviour detection and isolation in wireless ad hoc networks using policies
-
NY, USA, June
-
O.F. Gonzalez-Duque, A.M. Hadjiantonis, G. Pavlou and M. Howarth, "Adaptive Misbehaviour Detection and Isolation in Wireless Ad Hoc networks Using Policies", Proc. IFIP/IEEE International Symposium on Integrated Network Management (IM 2009), pp 242-250, NY, USA, June 2009.
-
(2009)
Proc. IFIP/IEEE International Symposium on Integrated Network Management (IM 2009)
, pp. 242-250
-
-
Gonzalez-Duque, O.F.1
Hadjiantonis, A.M.2
Pavlou, G.3
Howarth, M.4
-
35
-
-
33144479525
-
SCAN: Self-organized network-layer security in mobile ad hoc networks
-
DOI 10.1109/JSAC.2005.861384
-
H. Yang, J. Shu, X. Meng, and S. Lu, "SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 261-273, 2006. (Pubitemid 43269748)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 261-273
-
-
Yang, H.1
Shu, J.2
Meng, X.3
Lu, S.4
-
36
-
-
78650656608
-
Detect ddos flooding attacks in mobile ad hoc networks
-
Y. Guo and S. Perreau, "Detect DDoS Flooding Attacks in Mobile Ad Hoc Networks," International Journal of Security and Networks, Vol. 5, No.4, pp. 259-269, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 259-269
-
-
Guo, Y.1
Perreau, S.2
-
38
-
-
79951648076
-
LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc networks
-
H. Hsu, S. Zhu, and A. R. Hurson, "LIP: a Lightweight Interlayer Protocol for Preventing Packet Injection Attacks in Mobile Ad Hoc Networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 202-215, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 202-215
-
-
Hsu, H.1
Zhu, S.2
Hurson, A.R.3
-
39
-
-
33846606375
-
Defense against injecting traffic attack in cooperative ad hoc networks
-
St. Louis, Missouri, USA, Dec.
-
W.Yu and K.Ray, "Defense Against Injecting Traffic Attack in Cooperative Ad Hoc Networks", Proc. IEEE GLOBECOM, St. Louis, Missouri, USA, Dec. 2005.
-
(2005)
Proc. IEEE GLOBECOM
-
-
Yu, W.1
Ray, K.2
-
40
-
-
47249164736
-
Detecting black hole attack in tactical manets using topology graph
-
E.Padilla, N.Aschenbruck, P.Martini, M.Jahnke and J.Tolle, "Detecting Black Hole Attack in Tactical MANETs using Topology Graph", Proc. IEEE Conference on Local Computer Networks, 2007.
-
(2007)
Proc. IEEE Conference on Local Computer Networks
-
-
Padilla, E.1
Aschenbruck, N.2
Martini, P.3
Jahnke, M.4
Tolle, J.5
-
45
-
-
4544342574
-
A specification based intrusion detection for aodv
-
C.Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A Specification Based Intrusion Detection for AODV", Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
-
(2003)
Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks
-
-
Tseng, C.Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
46
-
-
6344273537
-
Secure message transmission in mobile ad hoc networks
-
DOI 10.1016/S1570-8705(03)00018-0
-
P. Papadimitratos and Z.J. Haas, "Secure Message Transmission in Mobile Ad Hoc Networks", Elsevier Journal of Ad Hoc Networks, Vol.1, No.1, pp 193-209, 2003. (Pubitemid 40421402)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 193-209
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
47
-
-
33646840438
-
The secure routing protocol (srp) for ad hoc networks
-
December
-
P. Papadimitratos, Z.J. Haas and P. Samar, "The Secure Routing Protocol (SRP) for Ad Hoc Networks", IETF Internet Draft , December 2002, available at http://www.ietf.org/proceedings/56/I-D/draftpapadimitratos-secure- routing-protocol-00.txt.
-
(2002)
IETF Internet Draft
-
-
Papadimitratos, P.1
Haas, Z.J.2
Samar, P.3
-
50
-
-
77956563130
-
On the use of Radio Resource Test in Wireless Ad Hoc Networks
-
Portugal, June
-
D.Monica, J. Leitao, L. Rodrigues and C.Riberio, "On the use of Radio Resource Test in Wireless Ad Hoc Networks", Proc.Workshop on Recent Advances in Intrusion Tolerant Systems, Portugal, June 2009.
-
(2009)
Proc.Workshop on Recent Advances in Intrusion Tolerant Systems
-
-
Monica, D.1
Leitao, J.2
Rodrigues, L.3
Riberio, C.4
-
51
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
July
-
N.Ye, X.Li, Q.Chen, M.Emran and M.Xu, "Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data", IEEE Transactions on Systems, Man, and, Cybernetics, Vol. 31, No. 4, July 2001.
-
(2001)
IEEE Transactions on Systems, Man, And, Cybernetics
, vol.31
, Issue.4
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, M.4
Xu, M.5
-
52
-
-
0035271352
-
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
-
DOI 10.1002/qre.392
-
N.Ye and Q.Chen, "An Anomaly Detection Technique based on a CHISQUARE Statistics for Detecting Intrusion into Information System", International Journal of Quality and Reliability Engineering International, Vol.17, No.6, pp 105-112, 2001. (Pubitemid 32443869)
-
(2001)
Quality and Reliability Engineering International
, vol.17
, Issue.2
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
56
-
-
0343302298
-
Asax software architecture and rule based language for universal audit trail analysis
-
France, November
-
N. Habra, B. L. Charlier, A. Mounji and I. Mathie, "Asax Software Architecture and Rule Based Language for Universal Audit Trail Analysis", Proc. European Symposium on Research in Computer Security ESORICS, France, November 1992.
-
(1992)
Proc. European Symposium on Research in Computer Security ESORICS
-
-
Habra, N.1
Charlier, B.L.2
Mounji, A.3
Mathie, I.4
-
58
-
-
85086420396
-
Syntax vs. Semantics: Competing approaches to dynamic network intrusion detection
-
DOI 10.1504/IJSN.2008.016199
-
W. Scheirer and M. Chuah, "Syntax vs. Semantics: Competing Approaches to Dynamic Network Intrusion Detection", International Journal of Security and Networks, Vol. 3, No. 1, pp. 24-35, 2008. (Pubitemid 351546019)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 24-35
-
-
Scheirer, W.1
Chuah, M.C.2
-
59
-
-
85117735487
-
A general cooperative intrusion detection architecture for manets
-
D.Sterne, P.Balasubramanyam, D.Carman, B.Wilson, R. Talpade, C.Ko, R. Balupari, C.-Y. Tseng, T.Bowen, K.Levitt and J.Rowe, "A General Cooperative Intrusion Detection Architecture for MANETs", Proc. IEEE International Workshop on Information Assurance (IWIA 05), 2005.
-
(2005)
Proc. IEEE International Workshop on Information Assurance (IWIA 05)
-
-
Sterne, D.1
Balasubramanyam, P.2
Carman, D.3
Wilson, B.4
Talpade, R.5
Ko, C.6
Balupari, R.7
Tseng, C.-Y.8
Bowen, T.9
Levitt, K.10
Rowe, J.11
-
64
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
-
Y. Liu, C. Comaniciu and H. Man, "Modelling Misbehaviour in Ad Hoc Networks: a Game Theoretic Approach for Intrusion Detection", International Journal of Security and Networks, Vol. 1, Nos.3/4, pp. 243-254, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 243-254
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
65
-
-
33947139090
-
Markov chain based anomaly detection for wireless ad-hoc distribution power communication networks
-
H.Jiang and H.Wang, "Markov Chain Based Anomaly Detection for Wireless Ad-Hoc Distribution Power Communication Networks", Proc. IEEE Power Engineering Conference, 2005.
-
(2005)
Proc. IEEE Power Engineering Conference
-
-
Jiang, H.1
Wang, H.2
-
66
-
-
0034829265
-
Markov chains, classifier, and intrusion detection
-
S.Jha, K.Tan and R.A.Maxion, "Markov Chains, Classifier, and Intrusion Detection", Proc. IEEE Computer Security Foundations Workshops, 2001.
-
(2001)
Proc. IEEE Computer Security Foundations Workshops
-
-
Jha, S.1
Tan, K.2
Maxion, R.A.3
-
68
-
-
34250761381
-
Integration of mobility and intrusion detection for wireless ad hoc networks
-
DOI 10.1002/dac.853
-
B.Sun, K.Wu, Y.Xiao and R.Wang, "Integration of Mobility and Intrusion Detection Wireless Ad Hoc Networks", Journal of Communication Systems, Wiley International, Vol. 20, No. 6, pp. 695-721, 2007. (Pubitemid 46959707)
-
(2007)
International Journal of Communication Systems
, vol.20
, Issue.6
, pp. 695-721
-
-
Sun, B.1
Wu, K.2
Xiao, Y.3
Wang, R.4
-
70
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Sep.
-
Y. Zhang, W. Lee, and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM Wireless Networks, Vol. 9, No. 5, pp. 545-56, Sep. 2003.
-
(2003)
ACM Wireless Networks
, vol.9
, Issue.5
, pp. 545-56
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
76
-
-
84888386674
-
A neural network scheme for anomaly based intrusion detection systems in mobile ad hoc networks
-
S.Jabbehdari, S.H. Talari and N.Modiri, "A Neural Network Scheme for Anomaly Based Intrusion Detection Systems in Mobile Ad Hoc Networks", Journal of Computing, Vol. 4, No. 2, pp-61-66, 2012.
-
(2012)
Journal of Computing
, vol.4
, Issue.2
, pp. 61-66
-
-
Jabbehdari, S.1
Talari, S.H.2
Modiri, N.3
-
77
-
-
0029267472
-
State transition analysis: A rule based intrusion detection approach
-
March
-
K.Ilgun, R.A.Kemmerer, and P.A.Porras, "State Transition Analysis: a Rule Based Intrusion Detection Approach", IEEE Transactions on Software Engineering, Vol.21, No.3, pp-181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
78
-
-
21644441634
-
An intrusion detection tool for aodv based ad hoc wireless networks
-
G. Vgina, S. Gawalani, K. Srinivasan, M. Belding-Royer and A. Kemmerer, "An Intrusion Detection Tool for AODV Based Ad Hoc Wireless Networks", Proc. IEEE Annual Computer Security Application Conference ACSAC,2004.
-
(2004)
Proc. IEEE Annual Computer Security Application Conference ACSAC
-
-
Vgina, G.1
Gawalani, S.2
Srinivasan, K.3
Belding-Royer, M.4
Kemmerer, A.5
-
79
-
-
33845889547
-
Detecting unauthorized and compromised nodes in mobile ad hoc networks
-
DOI 10.1016/j.adhoc.2005.11.005, PII S1570870505001113
-
N.Komninos, D. Vergados and C.Douligeris, "Detecting Unauthorized and Compromised Nodes in Mobile Ad Hoc Networks", Journal of Ad Hoc Networks, Elsevier, Vol. 5, No. 3, pp 289-298, April 2007. (Pubitemid 46027748)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.3
, pp. 289-298
-
-
Komninos, N.1
Vergados, D.2
Douligeris, C.3
-
80
-
-
4143141932
-
Signature based intrusion detection for wireless ad hoc networks: A comparative study of various routing protocols
-
Oct
-
F. Anjum, D. Subhadrabandhu and S. Sarkar, "Signature Based Intrusion Detection for Wireless Ad Hoc Networks: a Comparative Study of Various Routing Protocols", Proc. IEEE Vehicular Technology Conference (VTC), Oct 2003.
-
(2003)
Proc. IEEE Vehicular Technology Conference (VTC)
-
-
Anjum, F.1
Subhadrabandhu, D.2
Sarkar, S.3
-
82
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou, "Specification-Based Anomaly Detection: a New Approach for Detecting Network Intrusions", Proc. ACM Conference on Computer and Communications Security CCS '02, 2002.
-
(2002)
Proc. ACM Conference on Computer and Communications Security CCS '02
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
83
-
-
85084163313
-
Synthesizing fast intrusion prevention/ detection systems from high-level specifications
-
R. Sekar and P. Uppuluri, "Synthesizing Fast Intrusion Prevention/ Detection Systems from High-Level Specifications", Proc. Usenix Security Symposium, 1999.
-
(1999)
Proc. Usenix Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
84
-
-
33646178576
-
An eefsm-based intrusion detection system for ad hoc networks
-
J.-M. Orset, B. Alcalde, and A. R. Cavalli, "An eEFSM-Based Intrusion Detection System for Ad Hoc Networks", Proc. International Conference on Automated Technology for Verification and Analysis, pp 400-413, 2005.
-
(2005)
Proc. International Conference on Automated Technology for Verification and Analysis
, pp. 400-413
-
-
Orset, J.-M.1
Alcalde, B.2
Cavalli, A.R.3
-
86
-
-
33745657261
-
A specification-based intrusion detection model for olsr
-
H. Tseng, T.Song, P. Balasubramanyam, C.Ko and K.Levitt, "A Specification-Based Intrusion Detection Model for OLSR," Proc. International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 330-350, 2005.
-
(2005)
Proc. International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 330-350
-
-
Tseng, H.1
Song, T.2
Balasubramanyam, P.3
Ko, C.4
Levitt, K.5
-
87
-
-
35248863000
-
Specification synthesis for monitoring and analysis of manet protocols
-
N. Stakhanova, S. Basu, W. Zhang, X. Wang, and J. Wong, "Specification Synthesis for Monitoring and Analysis of MANET Protocols," Proc. International Symposium on Frontiers in Networking with Applications, 2007.
-
(2007)
Proc. International Symposium on Frontiers in Networking with Applications
-
-
Stakhanova, N.1
Basu, S.2
Zhang, W.3
Wang, X.4
Wong, J.5
-
94
-
-
0242510138
-
A secure on demand routing protocol for ad hoc networks
-
Sep.
-
Y.Hu, A.Perrig and B.Johnson, "A Secure On Demand Routing Protocol for Ad Hoc networks", Proc. ACM/ IEEE International Conference on Mobile Computing (MobiCom), Atlanta, Georgia, USA, pp 23-28, Sep. 2002.
-
(2002)
Proc. ACM/ IEEE International Conference on Mobile Computing (MobiCom), Atlanta, Georgia, USA
, pp. 23-28
-
-
Hu, Y.1
Perrig, A.2
Johnson, B.3
-
95
-
-
44649095872
-
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
-
V. Karyotis, S. Papavassiliou, M. Grammatikou, and V. Maglaris, "A Novel Framework for Mobile Attack Strategy Modelling and Vulnerability Analysis in Wireless Ad Hoc Networks," International Journal of Security and Networks, Vol. 1, Nos.3/4, pp. 255-265, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 255-265
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, V.4
-
96
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
DOI 10.1016/S1570-8705(03)00019-2
-
Y.Hu, B. Johnson and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", International Journal of Ad hoc Networks, Vol.1, pp 175-192, 2003. (Pubitemid 40421401)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
97
-
-
84879894593
-
Protection of MANETs from a range of attacks using an intrusion detection and prevention system
-
Springer, In Press, DOI 10.1007/s11235-011-9484-6, July
-
A.Nadeem and M.Howarth, "Protection of MANETs from a range of attacks using an intrusion detection and prevention system", Telecommunication Systems Journal, Springer, In Press, DOI 10.1007/s11235-011- 9484-6, July 2011.
-
(2011)
Telecommunication Systems Journal
-
-
Nadeem, A.1
Howarth, M.2
|