FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[2] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[3] Riccardo Poli,et al. New ideas in optimization , 1999 .
[4] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[5] Edson dos Santos Moreira,et al. Implementation of an intrusion detection system based on mobile agents , 2000, 2000 Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems.
[6] Marco Dorigo,et al. The ant colony optimization meta-heuristic , 1999 .
[7] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[8] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[9] Ruijian Zhang. Using Constructive induction To Enhance The Predictive Accuracy of the C5 Machine Learning Environment , 2004, IC-AI.
[10] Udo W. Pooch,et al. Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.
[11] T. Srinivasan,et al. A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks , 2005, ICCNMC.
[12] Alex Alves Freitas,et al. Data mining with an ant colony optimization algorithm , 2002, IEEE Trans. Evol. Comput..
[13] D. Dasgupta,et al. Mobile security agents for network traffic analysis , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[14] Sarit Kraus,et al. Methods for Task Allocation via Agent Coalition Formation , 1998, Artif. Intell..
[15] Risto Vaarandi,et al. A data clustering algorithm for mining patterns from event logs , 2003, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764).
[16] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.
[17] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[18] R. McAfee,et al. Auctions and Bidding , 1986 .
[19] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[20] Marco Dorigo,et al. Swarm intelligence: from natural to artificial systems , 1999 .
[21] Jizhou Sun,et al. TJIDS: an intrusion detection architecture for distributed network , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[22] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[23] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[24] Luca Maria Gambardella,et al. Ant Algorithms for Discrete Optimization , 1999, Artificial Life.
[25] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[26] Marco Dorigo,et al. Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.
[27] Vasant Honavar,et al. Lightweight agents for intrusion detection , 2003, J. Syst. Softw..
[28] M.I. Heywood,et al. Host-based intrusion detection using self-organizing maps , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[29] Martin Nilsson,et al. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[30] R. Chandrasekar,et al. An auction based task allocation scheme for power-aware intrusion detection in wireless ad-hoc networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.
[31] Stephanie Wehner,et al. Analyzing worms and network traffic using compression , 2005, J. Comput. Secur..
[32] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.