메뉴 건너뛰기




Volumn 2, Issue 3, 2006, Pages 297-324

Zone-based intrusion detection for mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85005954407     PISSN: 15519899     EISSN: 15520633     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (35)

References (36)
  • 4
  • 6
    • 84958760133 scopus 로고    scopus 로고
    • Evaluation of Tamper- Resistant Software Deviating from Structured Programming Rules
    • Lecture Notes in Computer Science 2119, Springer-Verlag
    • Goto, H., Mambo, M. Shizuya, H. and Watanabe, Y. (2001). “Evaluation of Tamper- Resistant Software Deviating from Structured Programming Rules,” in Information Security and Privacy (ACISP2001), Lecture Notes in Computer Science 2119, Springer-Verlag, 145-158.
    • (2001) Information Security and Privacy (ACISP2001) , pp. 145-158
    • Goto, H.1    Mambo, M.2    Shizuya, H.3    Watanabe, Y.4
  • 8
    • 0032659921 scopus 로고    scopus 로고
    • A Peer-to-Peer zone-based two-level link state routing for mobile Ad Hoc Networks
    • Joa-Ng, M. and Lu, I. (1999). “A Peer-to-Peer zone-based two-level link state routing for mobile Ad Hoc Networks,” in IEEE Journal on Selected Areas in Communications, 17, 8, 1415-1425.
    • (1999) IEEE Journal on Selected Areas in Communications , vol.17 , Issue.8 , pp. 1415-1425
    • Joa-Ng, M.1    Lu, I.2
  • 15
    • 0003908470 scopus 로고    scopus 로고
    • Technical Report RZ 3011(#93057), IBM Research Division, Zurich Research Laboratory
    • Nassehi, M. (1998). “Anomaly detection for markov models,” Technical Report RZ 3011(#93057), IBM Research Division, Zurich Research Laboratory.
    • (1998) Anomaly Detection for Markov Models
    • Nassehi, M.1
  • 16
    • 0003201842 scopus 로고    scopus 로고
    • A Markov Chain Model of Temporal Behavior for Anomaly Detection
    • United States Military Academy, West Point, NY
    • Nong, Y. (2000). “A Markov Chain Model of Temporal Behavior for Anomaly Detection,” in Proc. of the 2000 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 171-174.
    • (2000) Proc. of the 2000 IEEE Workshop on Information Assurance and Security , pp. 171-174
    • Nong, Y.1
  • 18
    • 0034226287 scopus 로고    scopus 로고
    • A Revised Taxonomy for Intrusion-Detection Systems
    • Debar, H., Dacier, M. and Wespi, A. (2000). “A Revised Taxonomy for Intrusion-Detection Systems,” Annales des Tlcommunications, 55, 361-378.
    • (2000) Annales Des Tlcommunications , vol.55 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 19
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • Oakland, CA
    • Lee, W. and Xiang, D. (2001). “Information-theoretic measures for anomaly detection,” in Proc. 2001 IEEE Symposium on Security and Privacy, Oakland, CA, 130-143.
    • (2001) Proc. 2001 IEEE Symposium on Security and Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 21
    • 0004048154 scopus 로고
    • Computer Security Threat Monitoring and Surveillance
    • Fort Washington, PA
    • Anderson, J.P. (1980). “Computer Security Threat Monitoring and Surveillance,” Technical Report, James P. Anderson Co., Fort Washington, PA.
    • (1980) Technical Report, James P. Anderson Co
    • Anderson, J.P.1
  • 24
    • 84860063562 scopus 로고    scopus 로고
    • Internet Security Systems, (2003). “RealSecure Network Protection,” Available at http://www.iss.net/products services/enterpriseprotection/rsnetwork.
    • (2003) Realsecure Network Protection
  • 27
    • 84940110274 scopus 로고    scopus 로고
    • Detecting Computer and Network Misuse through the Production-Based Expert System Toolset (P-BEST)
    • Oakland, CA
    • Lindqvist, U. and Porras, P.A. (1999). “Detecting Computer and Network Misuse through the Production-Based Expert System Toolset (P-BEST),” Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, 146-161.
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 34
    • 0031234827 scopus 로고    scopus 로고
    • IDAMN: An Intrusion Detection Architecture for Mobile Networks
    • Samfat, D. and Molva, R. (1997). “IDAMN: An Intrusion Detection Architecture for Mobile Networks,” IEEE Journal on Selected Areas in Communications, 15, 7, 1373-1380.
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.7 , pp. 1373-1380
    • Samfat, D.1    Molva, R.2
  • 36
    • 0036646011 scopus 로고    scopus 로고
    • Position based routing in ad hoc networks
    • Stojmenovic, I. (2002). “Position based routing in ad hoc networks,” IEEE Commmunications Magazine, 40, 7, 128-134.
    • (2002) IEEE Commmunications Magazine , vol.40 , Issue.7 , pp. 128-134
    • Stojmenovic, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.