-
2
-
-
79955281664
-
AIS for Misbehavior Detection in Wireless Sensor Networks: Performance and Design Principles
-
special session on Recent developments in artificial immune systems, Singapore
-
Martin Drozda, Sven Schaust, Helena Szczerbicka. AIS for Misbehavior Detection in Wireless Sensor Networks: Performance and Design Principles. Proc. IEEE Congress on Evolutionary Computation (CEC'07), special session on Recent developments in artificial immune systems, pp. 3719-3726, Singapore, 2007.
-
(2007)
Proc. IEEE Congress on Evolutionary Computation (CEC'07)
, pp. 3719-3726
-
-
Drozda, M.1
Schaust, S.2
Szczerbicka, H.3
-
8
-
-
33751021110
-
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm
-
J. Kim, P. Bentley, C. Wallenta, M. Ahmed, S. Hailes. Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. Proc. International Conference on Artificial Immune Systems (ICARIS), pp. 390-403, 2006.
-
(2006)
Proc. International Conference on Artificial Immune Systems (ICARIS)
, pp. 390-403
-
-
Kim, J.1
Bentley, P.2
Wallenta, C.3
Ahmed, M.4
Hailes, S.5
-
11
-
-
32344436245
-
-
IOS Press
-
Vijay Bhuse and Ajay Gupta. Anomaly intrusion detection in wireless sensor networks. J. High Speed Netw., vol. 15, no. 1, pp. 33-51, IOS Press, 2006.
-
(2006)
Anomaly intrusion detection in wireless sensor networks. J. High Speed Netw.
, vol.15
, Issue.1
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
12
-
-
35348928856
-
Intrusion Detection for Routing Attakcs in Sensor Networks
-
Taylor & Francis
-
C. Eik Loo and M. Yong Ng and C. Leckie and M. Palaniswami. Intrusion Detection for Routing Attakcs in Sensor Networks. International Journal of Distributed Sensor Networks, vol. 2, pp. 313-332, Taylor & Francis, 2006.
-
(2006)
International Journal of Distributed Sensor Networks
, vol.2
, pp. 313-332
-
-
Eik Loo, C.1
Yong Ng, M.2
Leckie, C.3
Palaniswami, M.4
-
16
-
-
84870022514
-
Approaching Ad Hoc Wireless Networks with Autonomic Computing: A Misbehavior Perspective
-
Philadelphia, PA
-
M. Drozda, H. Szczerbicka, R. Barton, T. Bessey, M. Becker. Approaching Ad Hoc Wireless Networks with Autonomic Computing: A Misbehavior Perspective. Proc. [2005] International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'05), pp. 723-733, Philadelphia, PA, 2005.
-
(2005)
Proc. [2005] International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'05)
, pp. 723-733
-
-
Drozda, M.1
Szczerbicka, H.2
Barton, R.3
Bessey, T.4
Becker, M.5
-
17
-
-
18744385858
-
JiST: an efficient approach to simulation using virtual machines
-
R. Barr, Z.J. Haas, R. van Renesse. JiST: an efficient approach to simulation using virtual machines. Software Practice and Experience, vol. 35, no. 6, pp. 539-576, 2005.
-
(2005)
Software Practice and Experience
, vol.35
, Issue.6
, pp. 539-576
-
-
Barr, R.1
Haas, Z.J.2
van Renesse, R.3
-
22
-
-
26844458123
-
An Artificial Immune System for Misbehavior Detection inMobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors
-
Slavǐsa Sarafijanovíc and Jean-Yves Le Boudec. An Artificial Immune System for Misbehavior Detection inMobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors. Proc. ICARIS (Third international conference on artificial immune systems), 2004.
-
(2004)
Proc. ICARIS (Third international conference on artificial immune systems)
-
-
Sarafijanovíc, S.1
Le Boudec, J.-Y.2
-
23
-
-
33745804827
-
An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-Hoc Networks
-
J.Y. Le Boudec, S. Sarafijanovíc. An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-Hoc Networks. Proc. Bio-ADIT, pp. 96-111, 2004.
-
(2004)
Proc. Bio-ADIT
, pp. 96-111
-
-
Le Boudec, J.Y.1
Sarafijanovíc, S.2
-
29
-
-
28444486324
-
Medium Access Control inWireless Sensor Networks
-
Kluwer Academic Publishers, Norwell, MA, USA
-
W. Ye and J. Heidemann. Medium Access Control inWireless Sensor Networks.Wireless Sensor Networks, pp. 73-91, Kluwer Academic Publishers, Norwell, MA, USA, 2004.
-
(2004)
Wireless Sensor Networks
, pp. 73-91
-
-
Ye, W.1
Heidemann, J.2
-
31
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
September
-
Yongguang Zhang, Wenke Lee, and Yian Huang. Intrusion Detection Techniques for Mobile Wireless Networks. ACM/Kluwer Wireless Networks Journal (ACM WINET), vol. 9, no. 5, September 2003.
-
(2003)
ACM/Kluwer Wireless Networks Journal (ACM WINET)
, vol.9
, Issue.5
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
32
-
-
3042520226
-
Report on a working session on security in wireless ad hoc networks
-
Levente Buttýan, Jean-Pierre Hubaux. Report on a working session on security in wireless ad hoc networks. ACM SIGMOBILE Mobile Computing and Communications Review, vol. 7, no. 1, pp. 74 - 94, 2003.
-
(2003)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.7
, Issue.1
, pp. 74-94
-
-
Buttýan, L.1
Hubaux, J.-P.2
-
36
-
-
0041973497
-
Packet leashes: a defense against wormhole attacks in wireless networks
-
Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, 2003
-
Yih-Chun Hu, Adrian Perrig, David B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. Proc. INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, 2003.
-
(2003)
Proc. INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
38
-
-
2342630172
-
Secure traceroute to detect faulty or malicious routing
-
Venkata N. Padmanabhan, Daniel R. Simon. Secure traceroute to detect faulty or malicious routing. ACM SIGCOMM Computer Communication Review, vol. 33, issue 1, pp. 77-82, 2003.
-
(2003)
ACM SIGCOMM Computer Communication Review
, vol.33
, Issue.1
, pp. 77-82
-
-
Padmanabhan, V.N.1
Simon, D.R.2
-
40
-
-
0037086890
-
Wireless Sensor Networks: A Survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cyirci. Wireless Sensor Networks: A Survey. Computer Networks, 38(4):393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cyirci, E.4
-
41
-
-
0036473405
-
Verisim: Formal analysis of network simulations
-
K. Bhargavan, C.A. Gunter, M. Kim, I. Lee, D. Obradovic, O. Sokolsky, M. Viswanathan. Verisim: Formal analysis of network simulations. IEEE Transactions on Software Engineering, vol. 28, no. 2, pp. 129-145, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.2
, pp. 129-145
-
-
Bhargavan, K.1
Gunter, C.A.2
Kim, M.3
Lee, I.4
Obradovic, D.5
Sokolsky, O.6
Viswanathan, M.7
-
42
-
-
0042527818
-
Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks
-
Lausanne, Switzerland
-
Christopher L. Barrett,Martin Drozda, AchlaMarathe, andMadhav V.Marathe. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks. Proc. The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2002), pp. 92-103, Lausanne, Switzerland, 2002.
-
(2002)
Proc. The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2002)
, pp. 92-103
-
-
Barrett, C.L.1
Drozda, M.2
Marathe, A.3
Marathe, M.V.4
-
48
-
-
0038282217
-
Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt
-
D. Barbar`a and S. Jajodia (eds.), Kluwer Academic Publisher
-
Steven Noel, Duminda Wijesekera, Charles Youman. Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. In Applications of Data Mining in Computer Security, D. Barbar`a and S. Jajodia (eds.), Kluwer Academic Publisher, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Noel, S.1
Wijesekera, D.2
Youman, C.3
-
52
-
-
0036152263
-
On Credibility of Simulation Studies Of Telecommunication Networks
-
January
-
K. Pawlikowski, H.-D.J. Jeong and J.-S. Ruth Lee. On Credibility of Simulation Studies Of Telecommunication Networks. IEEE Communications Magazine, January [2002,] 132-139.
-
(2002)
IEEE Communications Magazine
, pp. 132-139
-
-
Pawlikowski, K.1
Jeong, H.-D.2
Lee, R.-S.3
-
53
-
-
0002893043
-
Immunology as information processing
-
edited by L.A. Segel and I. Cohen. Santa Fe Institute Studies in the Sciences of Complexity. New York: Oxford University Press
-
S. Forrest and S.A. Hofmeyr. Immunology as information processing. In Design Principles for the Immune System and Other Distributed Autonomous Systems, edited by L.A. Segel and I. Cohen. Santa Fe Institute Studies in the Sciences of Complexity. New York: Oxford University Press, 2001.
-
(2001)
Design Principles for the Immune System and Other Distributed Autonomous Systems
-
-
Forrest, S.1
Hofmeyr, S.A.2
-
57
-
-
0035361712
-
Network support for IP traceback
-
Stefan Savage, DavidWetherall, Anna Karlin, Tom Anderson. Network support for IP traceback. IEEE/ACM Transactions on Networking, vol. 9, issue 3, pp. 226-237, 2001.
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
58
-
-
0035912764
-
How the immune system works to protect the host from infection: A personal view
-
C.A. Janeway Jr. How the immune system works to protect the host from infection: A personal view. Proc. the National Academy of Sciences, vol. 98, no. 13, pp. 7461- [7468,] 2001.
-
(2001)
Proc. the National Academy of Sciences
, vol.98
, Issue.13
, pp. 7461-7468
-
-
Janeway Jr., C.A.1
-
60
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Tim Baas. Intrusion detection systems and multisensor data fusion. Communications of the ACM, vol. 43, issue 4, pp. 99-105, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Baas, T.1
-
62
-
-
0033892676
-
Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks
-
Tel Aviv, Israel, March
-
S. Das, C. Perkins, and E. Royer. Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks. Proc. IEEE Conference on Computer Communications (INFOCOM), Tel Aviv, Israel, March 2000, pp. 3-12.
-
(2000)
Proc. IEEE Conference on Computer Communications (INFOCOM)
, pp. 3-12
-
-
Das, S.1
Perkins, C.2
Royer, E.3
-
63
-
-
0034041033
-
Immunobiology of Dendritic Cells
-
J. Banchereau, F. Briere, C. Caux, J. Davoust, S. Lebecque, Y.J. Liu, B. Pulendran, K. Palucka. Immunobiology of Dendritic Cells. Annual Review of Immunology, vol. 18, no. 1, pp. 767-811, 2000.
-
(2000)
Annual Review of Immunology
, vol.18
, Issue.1
, pp. 767-811
-
-
Banchereau, J.1
Briere, F.2
Caux, C.3
Davoust, J.4
Lebecque, S.5
Liu, Y.J.6
Pulendran, B.7
Palucka, K.8
-
64
-
-
0002320533
-
Immunity by Design: An Artificial Immune System
-
Morgan-Kaufmann, San Francisco, CA
-
S. Hofmeyr and S. Forrest. Immunity by Design: An Artificial Immune System. Proc. the Genetic and Evolutionary Computation Conference (GECCO), Morgan-Kaufmann, San Francisco, CA, pp. 1289-1296, 1999.
-
(1999)
Proc. the Genetic and Evolutionary Computation Conference (GECCO)
, pp. 1289-1296
-
-
Hofmeyr, S.1
Forrest, S.2
-
65
-
-
0037936354
-
The transport layer: tutorial and survey
-
Sami Iren, Paul D. Amer, Phillip, T. Conrad, The transport layer: tutorial and survey, ACM Computing Surveys, vol. 31, no. 4, pp. 360-404, 1999.
-
(1999)
ACM Computing Surveys
, vol.31
, Issue.4
, pp. 360-404
-
-
Iren, S.1
Phillip, P.D.A.2
Conrad, T.3
-
66
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
February
-
A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Distributed Systems Security (SNDSS), pages 151- [165,] February 1999.
-
(1999)
Distributed Systems Security (SNDSS)
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
68
-
-
0003417978
-
-
UCLA Computer Science Department Technical Report 990027, May
-
L. Bajaj, M. Takai, R. Ahuja, K. Tang, R. Bagrodia, and M. Gerla. GloMoSim: A Scalable Network Simulation Environment. UCLA Computer Science Department Technical Report 990027, May 1999.
-
(1999)
GloMoSim: A Scalable Network Simulation Environment
-
-
Bajaj, L.1
Takai, M.2
Ahuja, R.3
Tang, K.4
Bagrodia, R.5
Gerla, M.6
-
69
-
-
85106319926
-
Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
-
Dallas, TX, October
-
J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva. Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Proc. 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, TX, October 1998.
-
(1998)
Proc. 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.4
Jetcheva, J.5
-
73
-
-
0000629443
-
Dynamic Source Routing in Ad HocWireless Networks
-
Tomasz Imielinski and Hank Korth, Eds
-
D. Johnson and D. Maltz. Dynamic Source Routing in Ad HocWireless Networks. In Mobile Computing, Tomasz Imielinski and Hank Korth, Eds. Chapter 5, pp. 153-181, Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
74
-
-
0029718285
-
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
-
P. D'haeseleer, S. Forrest, P. Helman. An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. Proc. IEEE Symposium on Security and Privacy, pp. 110-119, 1996.
-
(1996)
Proc. IEEE Symposium on Security and Privacy
, pp. 110-119
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
75
-
-
85031307530
-
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
-
August
-
C. E. Perkins and P. Bhagwat. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers Proc. SIGCOMM'94, pages 234-244, August 1994.
-
(1994)
Proc. SIGCOMM'94
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
77
-
-
17644388014
-
complexity theory: An introduction for practitioners of classification
-
P. Arabie and L. Hubert, Eds, World Scientific Publishing Co., Inc., River Edge, NJ
-
Day, W.H.E., 1992, complexity theory: An introduction for practitioners of classification. In Clustering and Classification, P. Arabie and L. Hubert, Eds, World Scientific Publishing Co., Inc., River Edge, NJ
-
(1992)
Clustering and Classification
-
-
Day, W.H.E.1
-
78
-
-
0003454649
-
-
Wiley-Interscience, New York, NY, April
-
R. Jain. The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. Wiley-Interscience, New York, NY, April 1991.
-
(1991)
The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling
-
-
Jain, R.1
-
79
-
-
0004161991
-
-
Prentice Hall advanced reference series. Prentice Hall, Inc., Upper Saddle River, N.J
-
Jain and Dubes 1988, Algorithms for Clustering Data, Prentice Hall advanced reference series. Prentice Hall, Inc., Upper Saddle River, N.J.
-
(1988)
Algorithms for Clustering Data
-
-
Jain1
Dubes2
-
80
-
-
0020848951
-
A survey of recent advances in hierachical clustering algorithms which use cluster centers
-
Murtagh, F. 1984, A survey of recent advances in hierachical clustering algorithms which use cluster centers, Comput. J. 26, 354-359
-
(1984)
Comput. J.
, vol.26
, pp. 354-359
-
-
Murtagh, F.1
-
81
-
-
84869987612
-
Automated construction of classifications, conceptual clustering versus heuristic methods for clustering
-
E.S. Gelsema und L.N. Kanal, Eds
-
Michalski, R., Stepp, R. E., and Diday, E., 1983, Automated construction of classifications, conceptual clustering versus heuristic methods for clustering, In Pattern Recognition in Practice, E.S. Gelsema und L.N. Kanal, Eds. 425-436
-
(1983)
Pattern Recognition in Practice
, pp. 425-436
-
-
Michalski, R.1
Stepp, R.E.2
Diday, E.3
-
82
-
-
0018183618
-
Agglomerative clustering using the concept of mutual nearest neighborhood
-
Gowda, K. C. and Krishna, G. 1977, Agglomerative clustering using the concept of mutual nearest neighborhood, Pattern Regn. 10, 105-112
-
(1977)
Pattern Regn
, vol.10
, pp. 105-112
-
-
Gowda, K.C.1
Krishna, G.2
-
83
-
-
84944178665
-
Hierachical grouping to optimize an objective funtion
-
Ward, J. H. Jr 1963, Hierachical grouping to optimize an objective funtion J. Am Stat. Assoc. 58, 236-244
-
(1963)
J. Am Stat. Assoc.
, vol.58
, pp. 236-244
-
-
Ward Jr., J.H.1
-
84
-
-
84895331534
-
-
ZigBee Alliance
-
ZigBee Alliance. www.zigbee.org.
-
www.zigbee.org
-
-
-
85
-
-
84895395801
-
-
Crossbow Technology Inc
-
Crossbow Technology Inc. www.xbow.com
-
www.xbow.com
-
-
|