Collaborative techniques for intrusion detection in mobile ad-hoc networks
暂无分享,去创建一个
[1] Constantine N. Manikopoulos,et al. Architecture of the mobile ad-hoc network security (MANS) system , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[2] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[3] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[4] Sajal K. Das,et al. WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.
[5] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[6] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[7] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[8] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[9] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[10] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[11] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[12] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[13] Amitabh Mishra,et al. Intrusion detection in MANETS - the second wall of defense , 2003, IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468).
[14] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[15] Dhiraj K. Pradhan,et al. A cluster-based approach for routing in dynamic networks , 1997, CCRV.
[16] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[17] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.
[18] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[19] Mukesh Singhal,et al. Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.