-
1
-
-
77958005519
-
ROLEX-SP: Rules of lexical syntactic patterns for free text categorization
-
Al Zamil, M.G. and Can, A.B. (2011) 'ROLEX-SP: rules of lexical syntactic patterns for free text categorization', Knowledge-Based Systems, Vol. 24, No. 1, pp.58-65.
-
(2011)
Knowledge-Based Systems
, vol.24
, Issue.1
, pp. 58-65
-
-
Al Zamil, M.G.1
Can, A.B.2
-
4
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
Bao, F., Chen, R., Chang, M. and Cho, J.H. (2012) 'Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection', Network and Service Management, IEEE Transactions on, Vol. 9, No. 2, pp.169-183.
-
(2012)
Network and Service Management, IEEE Transactions on
, vol.9
, Issue.2
, pp. 169-183
-
-
Bao, F.1
Chen, R.2
Chang, M.3
Cho, J.H.4
-
5
-
-
84863691319
-
SUMO - Simulation of urban mobility-an overview
-
Behrisch, M., Bieker, L., Erdmann, J. and Krajzewicz, D. (2011) 'SUMO - simulation of urban mobility-an overview', SIMUL 2011, the Third International Conference on Advances in System Simulation, pp.55-60).
-
(2011)
SIMUL 2011, the Third International Conference on Advances in System Simulation
, pp. 55-60
-
-
Behrisch, M.1
Bieker, L.2
Erdmann, J.3
Krajzewicz, D.4
-
6
-
-
84959430382
-
-
(accessed 25 October 2013)
-
Berlin MOD Collection [online] http://dna.fernuni-hagen.de/secondo/BerlinMOD/BerlinMOD.html (accessed 25 October 2013).
-
Berlin MOD Collection [Online]
-
-
-
7
-
-
77949512428
-
A distributed intrusion detection system for ad-hoc wireless sensor networks: The AWISSENET distributed intrusion detection system
-
June, IEEE
-
Besson, L. and Leleu, P. (2009) 'A distributed intrusion detection system for ad-hoc wireless sensor networks: the AWISSENET distributed intrusion detection system', Systems, Signals and Image Processing, 2009: IWSSIP 2009, 16th International Conference on, June, pp.1-3, IEEE.
-
(2009)
Systems, Signals and Image Processing, 2009: IWSSIP 2009, 16th International Conference on
, pp. 1-3
-
-
Besson, L.1
Leleu, P.2
-
8
-
-
0035178273
-
Security enhancements in AODV protocol for wireless ad hoc networks
-
Fall, IEEE
-
Bhargava, S. and Agrawal, D.P. (2001) 'Security enhancements in AODV protocol for wireless ad hoc networks', Vehicular Technology Conference, 2001: VTC 2001, IEEE VTS 54th, Fall, Vol. 4, pp.2143-2147, IEEE.
-
(2001)
Vehicular Technology Conference, 2001: VTC 2001, IEEE VTS 54th
, vol.4
, pp. 2143-2147
-
-
Bhargava, S.1
Agrawal, D.P.2
-
9
-
-
79959520290
-
On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks
-
Boppana, R.V. and Su, X. (2011) 'On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks', Mobile Computing, IEEE Transactions on, Vol. 10, No. 8, pp.1162-1174.
-
(2011)
Mobile Computing, IEEE Transactions on
, vol.10
, Issue.8
, pp. 1162-1174
-
-
Boppana, R.V.1
Su, X.2
-
10
-
-
84869593467
-
Data aggregation in VANETs: The VESPA approach
-
July, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST)
-
Defude, B., Delot, T., Ilarri, S., Zechinelli, J.L. and Cenerario, N. (2008) 'Data aggregation in VANETs: the VESPA approach', Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, July, p.13, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST).
-
(2008)
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
, pp. 13
-
-
Defude, B.1
Delot, T.2
Ilarri, S.3
Zechinelli, J.L.4
Cenerario, N.5
-
11
-
-
4143084830
-
SVM-based intrusion detection system for wireless ad hoc networks
-
Orlando, FL, USA, 6-9 October
-
Deng, H., Zeng, Q. and Agrawal, D.P. (2003) 'SVM-based intrusion detection system for wireless ad hoc networks', Proceedings of the 58th IEEE Vehicular Technology Conference (VTC'03), Orlando, FL, USA, 6-9 October, Vol. 3, pp.2147-2151.
-
(2003)
Proceedings of the 58th IEEE Vehicular Technology Conference (VTC'03)
, vol.3
, pp. 2147-2151
-
-
Deng, H.1
Zeng, Q.2
Agrawal, D.P.3
-
13
-
-
71349088077
-
Berlin MOD: A benchmark for moving object databases
-
Düntgen, C., Behr, T. and Güting, R.H. (2009) 'Berlin MOD: a benchmark for moving object databases', The VLDB Journal, Vol. 18, No. 6, pp.1335-1368.
-
(2009)
The VLDB Journal
, vol.18
, Issue.6
, pp. 1335-1368
-
-
Düntgen, C.1
Behr, T.2
Güting, R.H.3
-
14
-
-
32144446861
-
Security issues in a future vehicular network
-
February
-
El Zarki, M., Mehrotra, S., Tsudik, G. and Venkatasubramanian, N. (2002) 'Security issues in a future vehicular network', European Wireless, February, Vol. 2, No. 1, pp.1-10.
-
(2002)
European Wireless
, vol.2
, Issue.1
, pp. 1-10
-
-
El Zarki, M.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
15
-
-
84878789394
-
A fuzzy logic approach to beaconing for vehicular ad hoc networks
-
Ghafoor, K.Z., Abu Bakar, K., Van Eenennaam, E., Khokhar, R.H. and Gonzalez, A.J. (2011) 'A fuzzy logic approach to beaconing for vehicular ad hoc networks', International Journal of Telecommunication Systems. Vol. 52, No. 1, pp.139-149.
-
(2011)
International Journal of Telecommunication Systems
, vol.52
, Issue.1
, pp. 139-149
-
-
Ghafoor, K.Z.1
Abu Bakar, K.2
Van Eenennaam, E.3
Khokhar, R.H.4
Gonzalez, A.J.5
-
16
-
-
84890550551
-
Beaconing approaches in vehicular ad hoc networks: A survey
-
Ghafoor, K.Z., Lloret, J., Bakar, K.A., Sadiq, A.S. and Mussa, S.A.B. (2013) 'Beaconing approaches in vehicular ad hoc networks: a survey', Wireless Personal Communications, Vol. 73, No. 3, pp.885-912.
-
(2013)
Wireless Personal Communications
, vol.73
, Issue.3
, pp. 885-912
-
-
Ghafoor, K.Z.1
Lloret, J.2
Bakar, K.A.3
Sadiq, A.S.4
Mussa, S.A.B.5
-
17
-
-
0003585297
-
-
Morgan Kaufmann, CA, USA
-
Han, J., Kamber, M. and Pei, J. (2006) Data Mining: Concepts and Techniques, Morgan Kaufmann, CA, USA.
-
(2006)
Data Mining: Concepts and Techniques
-
-
Han, J.1
Kamber, M.2
Pei, J.3
-
18
-
-
4544258840
-
A cooperative intrusion detection system for ad hoc networks
-
Fairfax, VA, USA
-
Huang, Y. and Lee, W. (2003) 'A cooperative intrusion detection system for ad hoc networks', Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), Fairfax, VA, USA, pp.135-147
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)
, pp. 135-147
-
-
Huang, Y.1
Lee, W.2
-
19
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
-
Hwang, K., Cai, M., Chen, Y. and Qin, M. (2007) 'Hybrid intrusion detection with weighted signature generation over anomalous internet episodes', Dependable and Secure Computing, IEEE Transactions on, Vol. 4, No. 1, pp.41-55.
-
(2007)
Dependable and Secure Computing, IEEE Transactions on
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
20
-
-
78649258582
-
The intrusion detection in mobile sensor network
-
September, ACM
-
Keung, Y., Li, B. and Zhang, Q. (2010) 'The intrusion detection in mobile sensor network', Proceedings of the Eleventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, September, pp.11-20, ACM.
-
(2010)
Proceedings of the Eleventh ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 11-20
-
-
Keung, Y.1
Li, B.2
Zhang, Q.3
-
21
-
-
84883413105
-
Realistic and efficient radio propagation model for V2X communications
-
Khokhar, R.H., Zia, T., Ghafoor, K.Z., Lloret, J. and Shiraz, M. (2013) 'Realistic and efficient radio propagation model for V2X communications', KSII Transactions on Internet & Information Systems, Vol. 7, No. 8, pp.1933-1954.
-
(2013)
KSII Transactions on Internet & Information Systems
, vol.7
, Issue.8
, pp. 1933-1954
-
-
Khokhar, R.H.1
Zia, T.2
Ghafoor, K.Z.3
Lloret, J.4
Shiraz, M.5
-
22
-
-
72949113634
-
A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
-
Lauf, A.P., Peters, R.A. and Robinson, W.H. (2010) 'A distributed intrusion detection system for resource-constrained devices in ad-hoc networks', Ad Hoc Networks, Vol. 8, No. 3, pp.253-266.
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.3
, pp. 253-266
-
-
Lauf, A.P.1
Peters, R.A.2
Robinson, W.H.3
-
23
-
-
84855217006
-
A comparative study of data mining algorithms for network intrusion detection in the presence of poor quality data
-
Lauría, E.J. and Tayi, G.K. (2003) 'A comparative study of data mining algorithms for network intrusion detection in the presence of poor quality data', IQ, pp.190-201.
-
(2003)
IQ
, pp. 190-201
-
-
Lauría, E.J.1
Tayi, G.K.2
-
24
-
-
84900537680
-
An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming
-
Mabu, S., Chen, C., Lu, N., Shimada, K. and Hirasawa, K. (2011) 'An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming', Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, Vol. 41, No. 1, pp.130-139.
-
(2011)
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on
, vol.41
, Issue.1
, pp. 130-139
-
-
Mabu, S.1
Chen, C.2
Lu, N.3
Shimada, K.4
Hirasawa, K.5
-
25
-
-
79951649381
-
Network intrusion detection system embedded on a smart sensor
-
Maciá-Pérez, F., Mora-Gimeno, F., Marcos-Jorquera, D., Gil-Martínez-Abarca, J.A., Ramos-Morillo, H. and Lorenzo-Fonseca, I. (2011) 'Network intrusion detection system embedded on a smart sensor', Industrial Electronics, IEEE Transactions on, Vol. 58, No. 3, pp.722-732.
-
(2011)
Industrial Electronics, IEEE Transactions on
, vol.58
, Issue.3
, pp. 722-732
-
-
Maciá-Pérez, F.1
Mora-Gimeno, F.2
Marcos-Jorquera, D.3
Gil-Martínez-Abarca, J.A.4
Ramos-Morillo, H.5
Lorenzo-Fonseca, I.6
-
26
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
IEEE
-
Mishra, A., Nadkarni, K. and Patcha, A. (2004) 'Intrusion detection in wireless ad hoc networks', Wireless Communications, Vol. 11, No. 1, pp.48-60, IEEE.
-
(2004)
Wireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
27
-
-
84870065075
-
Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
-
Mitrokotsa, A. and Dimitrakakis, C. (2013) 'Intrusion detection in MANET using classification algorithms: the effects of cost and model selection', Ad Hoc Networks, Vol. 11, No. 1, pp.226-237.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.1
, pp. 226-237
-
-
Mitrokotsa, A.1
Dimitrakakis, C.2
-
28
-
-
51149107246
-
Intrusion detection in mobile ad hoc networks using classification algorithms
-
23-27 June, Springer, Palma de Mallorca, Spain
-
Mitrokotsa, A., Tsagkaris, M. and Douligeris, C. (2008) 'Intrusion detection in mobile ad hoc networks using classification algorithms', Proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2008), 23-27 June, pp.133-144, Springer, Palma de Mallorca, Spain.
-
(2008)
Proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2008)
, pp. 133-144
-
-
Mitrokotsa, A.1
Tsagkaris, M.2
Douligeris, C.3
-
29
-
-
0028429573
-
Inductive logic programming: Theory and methods
-
Muggleton, S. and De Raedt, L. (1994) 'Inductive logic programming: theory and methods', The Journal of Logic Programming, Vol. 19, No. 1, pp.629-679.
-
(1994)
The Journal of Logic Programming
, vol.19
, Issue.1
, pp. 629-679
-
-
Muggleton, S.1
De Raedt, L.2
-
30
-
-
57049093231
-
Application of data mining to network intrusion detection: Classifier selection model
-
Springer, Berlin Heidelberg
-
Nguyen, H.A. and Choi, D. (2008) 'Application of data mining to network intrusion detection: classifier selection model', Challenges for Next Generation Network Operations and Service Management, pp.399-408, Springer, Berlin Heidelberg.
-
(2008)
Challenges for Next Generation Network Operations and Service Management
, pp. 399-408
-
-
Nguyen, H.A.1
Choi, D.2
-
31
-
-
84929370156
-
Intrusion detection systems for the availability attacks in ad-hoc networks
-
Shah, N. and Valiveti, S. (2012) 'Intrusion detection systems for the availability attacks in ad-hoc networks', International Journal of Electronics and Computer Science Engineering (IJECSE), Vol. 1, No. 3pp.1850-1857, ISSN: 2277-1956.
-
(2012)
International Journal of Electronics and Computer Science Engineering (IJECSE)
, vol.1
, Issue.3
, pp. 1850-1857
-
-
Shah, N.1
Valiveti, S.2
-
32
-
-
85026932476
-
Wormhole attack detection by using intrusion detection system in VANET
-
Singh, J. and Sharma, N. (2012) 'Wormhole attack detection by using intrusion detection system in VANET', International Journal of Computer Networks and Wireless Communications, Vol. 2, No. 5, pp.638-642.
-
(2012)
International Journal of Computer Networks and Wireless Communications
, vol.2
, Issue.5
, pp. 638-642
-
-
Singh, J.1
Sharma, N.2
-
33
-
-
84910686309
-
Improvement of intrusion detection system in data mining using neural network
-
Singh, S. and Bansal, M. (2013) 'Improvement of intrusion detection system in data mining using neural network', International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 9, pp.1124-1130.
-
(2013)
International Journal of Advanced Research in Computer Science and Software Engineering
, vol.3
, Issue.9
, pp. 1124-1130
-
-
Singh, S.1
Bansal, M.2
-
34
-
-
79959948198
-
Classes of attacks in VANE
-
IEEE
-
Sumra, I.A., Ahmad, I., Hasbullah, H. and Bin Ab Manan, J.L. (2011) 'Classes of attacks in VANE', Electronics, Communications and Photonics Conference (SIECPC), 2011 Saudi International, pp.1-5, IEEE.
-
(2011)
Electronics, Communications and Photonics Conference (SIECPC), 2011 Saudi International
, pp. 1-5
-
-
Sumra, I.A.1
Ahmad, I.2
Hasbullah, H.3
Bin Ab Manan, J.L.4
-
35
-
-
36849062699
-
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
-
IEEE
-
Sun, B., Osborne, L., Xiao, Y. and Guizani, S. (2007) 'Intrusion detection techniques in mobile ad hoc and wireless sensor networks', Wireless Communications, Vol. 14, No. 5, pp.56-63, IEEE.
-
(2007)
Wireless Communications
, vol.14
, Issue.5
, pp. 56-63
-
-
Sun, B.1
Osborne, L.2
Xiao, Y.3
Guizani, S.4
-
36
-
-
84887606769
-
Phased searching with NEAT in a time-scaled framework: Experiments on a computer-aided detection system for lung nodules
-
Tan, M., Deklerck, R., Cornelis, J. and Jansen, B. (2013) 'Phased searching with NEAT in a time-scaled framework: experiments on a computer-aided detection system for lung nodules', Artificial Intelligence in Medicine, Vol. 59, No. 3, pp.157-167.
-
(2013)
Artificial Intelligence in Medicine
, vol.59
, Issue.3
, pp. 157-167
-
-
Tan, M.1
Deklerck, R.2
Cornelis, J.3
Jansen, B.4
-
37
-
-
77955847605
-
Toward credible evaluation of anomaly-based intrusion-detection methods
-
Tavallaee, M., Stakhanova, N. and Ghorbani, A.A. (2010) 'Toward credible evaluation of anomaly-based intrusion-detection methods', Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, Vol. 40, No. 5, pp.516-524.
-
(2010)
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on
, vol.40
, Issue.5
, pp. 516-524
-
-
Tavallaee, M.1
Stakhanova, N.2
Ghorbani, A.A.3
-
38
-
-
0021518106
-
A theory of the learnable
-
Valiant, L.G. (1984) 'A theory of the learnable', Communications of the ACM, Vol. 27, No. 11, pp.1134-1142.
-
(1984)
Communications of the ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.G.1
-
39
-
-
74249094908
-
Intrusion detection in Gaussian distributed wireless sensor networks
-
Macau, China
-
Wang, Y. and Fu, W. (2009) 'Intrusion detection in Gaussian distributed wireless sensor networks', Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Macau, China, pp.12-15.
-
(2009)
Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
, pp. 12-15
-
-
Wang, Y.1
Fu, W.2
-
40
-
-
85008532858
-
Intrusion detection scheme using traffic prediction for wireless industrial networks
-
Wei, M. and Kim, K. (2012) 'Intrusion detection scheme using traffic prediction for wireless industrial networks', Journal of Communications and Networks, Vol. 14, No. 3, pp.310-318.
-
(2012)
Journal of Communications and Networks
, vol.14
, Issue.3
, pp. 310-318
-
-
Wei, M.1
Kim, K.2
-
41
-
-
33749543648
-
Regularized discriminant analysis for high dimensional, low sample size data
-
Philadelphia, PA, USA, 20-23 August
-
Ye, J. Jieping and Wang, T. (2006) 'Regularized discriminant analysis for high dimensional, low sample size data', Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, 20-23 August.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Ye, J.J.1
Wang, T.2
-
42
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang, Y., Lee, W. and Huang, Y.A. (2003) 'Intrusion detection techniques for mobile wireless networks', Wireless Networks, Vol. 9, No. 5, pp.545-556.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.A.3
-
43
-
-
77955082590
-
Outlier detection techniques for wireless sensor networks: A survey
-
IEEE
-
Zhang, Y., Meratnia, N. and Havinga, P. (2010) 'Outlier detection techniques for wireless sensor networks: a survey', Communications Surveys & Tutorials, Vol. 12, No. 2, pp.159-170, IEEE.
-
(2010)
Communications Surveys & Tutorials
, vol.12
, Issue.2
, pp. 159-170
-
-
Zhang, Y.1
Meratnia, N.2
Havinga, P.3
|