Intrusion detection: Ad-hoc networks to ambient intelligence framework
暂无分享,去创建一个
[1] Songwu Lu,et al. SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[2] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[3] Rituparna Chaki,et al. A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.
[4] Zdravko Karakehayov. Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .
[5] Rituparna Chaki,et al. HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[6] Rituparna Chaki,et al. IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network , 2007, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).
[7] Mircea Vladutiu,et al. Redundancy at Link Level for Non-Traditional Grids Implemented with Intelligent Agents , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.
[8] Yi Qian,et al. Performance Study of a Secure Routing Protocol in Wireless Mobile Ad Hoc Networks , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.
[9] Amitabh Mishra,et al. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.
[10] Rituparna Chaki,et al. BHIDS: a new, cluster based algorithm for black hole IDS , 2010, Secur. Commun. Networks.
[11] Wei Yu,et al. Securing Wireless Ad Hoc Networks under noise and Imperfect Monitoring , 2006 .
[12] Dong Hwa Kim,et al. 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM, Krakow, Poland, October 8-10, 2010 , 2010, CISIM.
[13] Boris E. R. de Ruyter,et al. New research perspectives on Ambient Intelligence , 2009, J. Ambient Intell. Smart Environ..
[14] Amitabh Mishra,et al. Intrusion detection in MANETS - the second wall of defense , 2003, IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468).
[15] Fumio Harashima,et al. IEEE International Conference on Systems, Man, and Cybernetics , 2000 .
[16] Chris J. Mitchell,et al. Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.
[17] Anirban Chakrabarti. Grid computing security , 2007 .
[18] M.R. Lyu,et al. An authentication service against dishonest users in mobile ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[19] Chunxiao Chigan,et al. Secure node misbehaviors in mobile ad hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[20] Constantine N. Manikopoulos,et al. Architecture of the mobile ad-hoc network security (MANS) system , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[21] Chadi Assi,et al. Cross-Layer Cooperation to Handle MAC Misbehavior in Ad Hoc Networks , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[22] Minghua Zhao,et al. An Efficient and Secure Group Key Agreement Using in the Group Communication of Mobile Ad-hoc Networks , 2006, 2006 International Conference on Computational Intelligence and Security.
[23] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[24] K. V. Arya,et al. Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[25] Albert Ali Salah,et al. Sensor Networks for Ambient Intelligence , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.
[26] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[27] Dharma P. Agrawal,et al. Totally distributed key management for dynamic groups in MANETs , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[28] Carsten Rudolph,et al. Security Engineering for Ambient Intelligence: A Manifesto , 2006 .
[29] P. Briggs,et al. Using Ubicomp systems for exchanging health information : considering trust and privacy issues , 2006 .
[30] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.
[31] Alagan Anpalagan,et al. IEEE Canadian Conference on Electrical and Computer Engineering 2008 , 2008 .