The study of Intrusion Detection Techniques for Cooperation of Node
暂无分享,去创建一个
[1] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[2] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[3] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[4] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[5] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[6] S. Buchegger,et al. Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[7] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[8] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[9] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[10] Jean-Yves Le Boudec,et al. A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.
[11] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[12] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[13] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[14] Giovanni Vigna,et al. An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.
[15] Kavitha Kumar. Intrusion detection in mobile adhoc networks , 2009 .
[16] S. Madhavi,et al. An Intrusion Detection System in Mobile AdHoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).