-
1
-
-
0034546898
-
Intrusion Detection in Wireless Ad Hoc Networks
-
Boston, MA
-
Zhang, Y. and Lee, W. (2000). “Intrusion Detection in Wireless Ad Hoc Networks,” the 6th Annual International Conf. on Mobile Computing and Networking (ACM MobiCom’00), Boston, MA, 275-283.
-
(2000)
The 6Th Annual International Conf. on Mobile Computing and Networking (ACM MobiCom’00)
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
2
-
-
0037629724
-
Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies
-
Providence, RI
-
Huang, Y., Fan, W., Lee, W. and Yu, P.S. (2003). “Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies,” Proc. of the 23rd International Conference on Distributed Computing Systems, Providence, RI, 478-487.
-
(2003)
Proc. of the 23Rd International Conference on Distributed Computing Systems
, pp. 478-487
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.S.4
-
3
-
-
84952307800
-
Routing Anomaly Detection in Mobile Ad-Hoc Networks
-
Dallas, TX
-
Sun, B., Wu, K. and Pooch, U. (2003). “Routing Anomaly Detection in Mobile Ad-Hoc Networks,” IEEE International Conference on Computer Communications and Networks (ICCCN’03), Dallas, TX, 25-31.
-
(2003)
IEEE International Conference on Computer Communications and Networks (ICCCN’03)
, pp. 25-31
-
-
Sun, B.1
Wu, K.2
Pooch, U.3
-
4
-
-
1542377708
-
Alert Aggregation in Mobile Ad-Hoc Networks
-
San Deigo, CA
-
Sun, B., Wu, K. and Pooch, U. “Alert Aggregation in Mobile Ad-Hoc Networks,” ACM Wireless Security (WiSe’03), San Deigo, CA, 69-78.
-
ACM Wireless Security (WiSe’03)
, pp. 69-78
-
-
Sun, B.1
Wu, K.2
Pooch, U.3
-
5
-
-
0242527339
-
Mobility Helps Security in Ad Hoc Networks
-
Annapolis, MD
-
Capkun, S., Hubaux, J.P. and Buttyn, L. (2003). “Mobility Helps Security in Ad Hoc Networks,” in Proc. of the 4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003), Annapolis, MD, 46-56.
-
(2003)
Proc. of the 4Th ACM Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc 2003)
, pp. 46-56
-
-
Capkun, S.1
Hubaux, J.P.2
Buttyn, L.3
-
6
-
-
84958760133
-
Evaluation of Tamper- Resistant Software Deviating from Structured Programming Rules
-
Lecture Notes in Computer Science 2119, Springer-Verlag
-
Goto, H., Mambo, M. Shizuya, H. and Watanabe, Y. (2001). “Evaluation of Tamper- Resistant Software Deviating from Structured Programming Rules,” in Information Security and Privacy (ACISP2001), Lecture Notes in Computer Science 2119, Springer-Verlag, 145-158.
-
(2001)
Information Security and Privacy (ACISP2001)
, pp. 145-158
-
-
Goto, H.1
Mambo, M.2
Shizuya, H.3
Watanabe, Y.4
-
8
-
-
0032659921
-
A Peer-to-Peer zone-based two-level link state routing for mobile Ad Hoc Networks
-
Joa-Ng, M. and Lu, I. (1999). “A Peer-to-Peer zone-based two-level link state routing for mobile Ad Hoc Networks,” in IEEE Journal on Selected Areas in Communications, 17, 8, 1415-1425.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1415-1425
-
-
Joa-Ng, M.1
Lu, I.2
-
9
-
-
0031652485
-
GloMoSim: A Library for Parallel Simulation of Large-Scale Wireless Networks
-
Banff, Canada
-
Zeng, X., Bagrodia, R. and Gerla, M. (1998). “GloMoSim: a Library for Parallel Simulation of Large-Scale Wireless Networks,” Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PADS ’98), Banff, Canada, 154-161.
-
(1998)
Proceedings of the 12Th Workshop on Parallel and Distributed Simulations (PADS ’98)
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
10
-
-
0018918171
-
An Algorithm for Vector Quantizer Design
-
Linde, Y., Buzo, A. and Gray, R.M. (1980). “An Algorithm for Vector Quantizer Design,” IEEE Transactions on Communications, 702-710.
-
(1980)
IEEE Transactions on Communications
, pp. 702-710
-
-
Linde, Y.1
Buzo, A.2
Gray, R.M.3
-
12
-
-
0034788435
-
A Study of Smoothing Methods for Language Models Applied to Ad Hoc Information Retrieval
-
New Orleans, LA
-
Zhai, C. and Lafferty, J. (2001). “A Study of Smoothing Methods for Language Models Applied to Ad Hoc Information Retrieval,” in Proceedings of the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2001), New Orleans, LA, 334-342.
-
(2001)
Proceedings of the 24Th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2001)
, pp. 334-342
-
-
Zhai, C.1
Lafferty, J.2
-
13
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Boston, MA
-
Marti, S., Giuli, T., Lai, K. and Baker, M. (2000). “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” the 6th Annual International Conf. on Mobile Computing and Networking (ACM MobiCom’00), Boston, MA, 255-265.
-
(2000)
The 6Th Annual International Conf. on Mobile Computing and Networking (ACM MobiCom’00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
14
-
-
0034829265
-
Markov chains, classifiers, and intrusion detection
-
Nova Scotia, Canada
-
Jha, S., Tan, K. and Maxion, R. (2001). “Markov chains, classifiers, and intrusion detection,” in the Proc. of 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, 206-219.
-
(2001)
Proc. of 14Th IEEE Computer Security Foundations Workshop, Cape Breton
, pp. 206-219
-
-
Jha, S.1
Tan, K.2
Maxion, R.3
-
15
-
-
0003908470
-
-
Technical Report RZ 3011(#93057), IBM Research Division, Zurich Research Laboratory
-
Nassehi, M. (1998). “Anomaly detection for markov models,” Technical Report RZ 3011(#93057), IBM Research Division, Zurich Research Laboratory.
-
(1998)
Anomaly Detection for Markov Models
-
-
Nassehi, M.1
-
16
-
-
0003201842
-
A Markov Chain Model of Temporal Behavior for Anomaly Detection
-
United States Military Academy, West Point, NY
-
Nong, Y. (2000). “A Markov Chain Model of Temporal Behavior for Anomaly Detection,” in Proc. of the 2000 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 171-174.
-
(2000)
Proc. of the 2000 IEEE Workshop on Information Assurance and Security
, pp. 171-174
-
-
Nong, Y.1
-
17
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Warrender, C., Forrest, S. and Pearlmutter, B. (1999). “Detecting intrusions using system calls: Alternative data models,” in Proc. of 1999 IEEE Symposium on Research in Security and Privacy, 133-145.
-
(1999)
Proc. of 1999 IEEE Symposium on Research in Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
18
-
-
0034226287
-
A Revised Taxonomy for Intrusion-Detection Systems
-
Debar, H., Dacier, M. and Wespi, A. (2000). “A Revised Taxonomy for Intrusion-Detection Systems,” Annales des Tlcommunications, 55, 361-378.
-
(2000)
Annales Des Tlcommunications
, vol.55
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
19
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Oakland, CA
-
Lee, W. and Xiang, D. (2001). “Information-theoretic measures for anomaly detection,” in Proc. 2001 IEEE Symposium on Security and Privacy, Oakland, CA, 130-143.
-
(2001)
Proc. 2001 IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
21
-
-
0004048154
-
Computer Security Threat Monitoring and Surveillance
-
Fort Washington, PA
-
Anderson, J.P. (1980). “Computer Security Threat Monitoring and Surveillance,” Technical Report, James P. Anderson Co., Fort Washington, PA.
-
(1980)
Technical Report, James P. Anderson Co
-
-
Anderson, J.P.1
-
24
-
-
84860063562
-
-
Internet Security Systems, (2003). “RealSecure Network Protection,” Available at http://www.iss.net/products services/enterpriseprotection/rsnetwork.
-
(2003)
Realsecure Network Protection
-
-
-
27
-
-
84940110274
-
Detecting Computer and Network Misuse through the Production-Based Expert System Toolset (P-BEST)
-
Oakland, CA
-
Lindqvist, U. and Porras, P.A. (1999). “Detecting Computer and Network Misuse through the Production-Based Expert System Toolset (P-BEST),” Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, 146-161.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
28
-
-
0242529344
-
Aggregation and Correlation of Intrusion-detection Alerts
-
Davis, CA
-
Debar, H. and Wespi, A. (2001). “Aggregation and Correlation of Intrusion-detection Alerts,” in Proc. of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), Davis, CA, 85-103.
-
(2001)
Proc. of the 4Th International Symposium on Recent Advances in Intrusion Detection (RAID 2001)
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
30
-
-
84867339043
-
-
Berkeley, CA
-
Cuppens, F. and Mige, A. (2002). “Alert Correlation in a Cooperative Intrusion Detection Framework,” in IEEE Symposium on Security and Privacy, Berkeley, CA, 202-215.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 202-215
-
-
Cuppens, F.1
Mige, A.2
-
31
-
-
0037952266
-
Probabilistic Alert Correlation
-
Davis, USA
-
Valdes, A. and Skinner, K. (2001). “Probabilistic Alert Correlation,” in Proc. of the Fourth International Workshop on the Recent Advances in Intrusion Detection (RAID 2001), Davis, USA, 54-68.
-
(2001)
Proc. of the Fourth International Workshop on the Recent Advances in Intrusion Detection (RAID
, vol.2001
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
32
-
-
84958963784
-
Analyzing Intensive Intrusion Alerts Via Correlation
-
LNCS 2516, Zurich, Switzerland
-
Ning, P., Cui, Y. and Reeves, D.S. (2002). “Analyzing Intensive Intrusion Alerts Via Correlation,” in Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), LNCS 2516, Zurich, Switzerland, 74-94.
-
(2002)
Proc. of the 5Th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 74-94
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
33
-
-
77956988169
-
M2D2: A Formal Data Model for IDS Alert Correlation
-
LNCS 2516, Zurich, Switzerland
-
Morin, B., M L. Debar, H. and Ducass, M. (2002). “M2D2: A Formal Data Model for IDS Alert Correlation,” in Proc. of the 5th Int. Symp. on Recent Advances in Intrusion Detection (RAID’02), LNCS 2516, Zurich, Switzerland, 115-137.
-
(2002)
Proc. of the 5Th Int. Symp. on Recent Advances in Intrusion Detection (RAID’02)
, pp. 115-137
-
-
Morin, B.1
Debar, M.L.2
Ducass, M.3
-
34
-
-
0031234827
-
IDAMN: An Intrusion Detection Architecture for Mobile Networks
-
Samfat, D. and Molva, R. (1997). “IDAMN: An Intrusion Detection Architecture for Mobile Networks,” IEEE Journal on Selected Areas in Communications, 15, 7, 1373-1380.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.7
, pp. 1373-1380
-
-
Samfat, D.1
Molva, R.2
-
36
-
-
0036646011
-
Position based routing in ad hoc networks
-
Stojmenovic, I. (2002). “Position based routing in ad hoc networks,” IEEE Commmunications Magazine, 40, 7, 128-134.
-
(2002)
IEEE Commmunications Magazine
, vol.40
, Issue.7
, pp. 128-134
-
-
Stojmenovic, I.1
|