Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
暂无分享,去创建一个
[1] Yang Li,et al. MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[2] Aikaterini Mitrokotsa,et al. Intrusion Detection with Neural Networks and Watermarking Techniques for MANET , 2007, IEEE International Conference on Pervasive Services.
[3] F. Mörchen,et al. ESOM-Maps : tools for clustering , visualization , and classification with Emergent SOM , 2005 .
[4] Aikaterini Mitrokotsa,et al. Intrusion Detection and Response in Ad hoc Networks , 2007 .
[5] Ayman I. Kayssi,et al. LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System , 2008, Int. J. Netw. Secur..
[6] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[7] Thomas M. Chen,et al. Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.
[8] Jung-Min Park,et al. A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..
[9] Chwei-Shyong Tsai,et al. An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet , 2005, Int. J. Netw. Secur..
[10] Olivier Festor,et al. Group Key Management in MANETs , 2008, Int. J. Netw. Secur..
[11] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[12] Luc Girardin. An Eye on Network Intruder-Administrator Shootouts , 1999, Workshop on Intrusion Detection and Network Monitoring.
[13] Juergen Seitz,et al. Digital Watermarking for Digital Media , 2005 .
[14] O. Kachirski,et al. Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.
[15] Jiwu Huang,et al. Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions , 2006, Int. J. Netw. Secur..
[16] Chun-Ta Li,et al. Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks , 2009, Int. J. Netw. Secur..
[17] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[18] Douglas S. Reeves,et al. Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework , 2001, SEC.
[19] Christos Douligeris,et al. Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.
[20] Tarun Bhaskar,et al. A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability , 2008, Int. J. Netw. Secur..
[21] Teddy Furon,et al. A Survey of Watermarking Security , 2005, IWDW.
[22] Saswati Sarkar,et al. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[23] C. Satizabal,et al. Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).
[24] Aikaterini Mitrokotsa,et al. Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks , 2008, ArXiv.
[25] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[26] S. Hyakin,et al. Neural Networks: A Comprehensive Foundation , 1994 .
[27] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[28] Iwan Setyawan,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000 .
[29] Anil Rawat,et al. Enhanced DSR for MANET with Improved Secured Route Discovery and QoS , 2007, Int. J. Netw. Secur..
[30] S. A. M. Makki,et al. The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV) , 2004, Security and Management.
[31] Ming-Chin Chuang,et al. An Efficient Authentication Scheme between MANET and WLAN Based on Mobile IPv6 , 2005 .