Implementation of IDS with response for securing MANETs
暂无分享,去创建一个
[1] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[2] Christophe Bidan,et al. Security of predefined groups in manets , 2007, Q2SWinet '07.
[3] Ki-Won Yeom,et al. An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.
[4] Michael Hilker,et al. Next Challenges in Bringing Artificial Immune Systems to Production in Network Security , 2008, ArXiv.
[5] Fikret Sivrikaya,et al. Energy-efficient channel access and routing protocols for multi-hop wireless networks , 2007 .
[6] Tao Li,et al. Immune Multi-agent Active Defense Model for Network Intrusion , 2006, SEAL.
[7] Tansu Alpcan,et al. A Cooperative AIS Framework for Intrusion Detection , 2007, 2007 IEEE International Conference on Communications.
[8] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[9] Marco Carvalho,et al. Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, ICCS.
[10] Muddassar Farooq,et al. A sense of danger: dendritic cells inspired artificial immune system for manet security , 2008, GECCO '08.
[11] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[12] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[13] Chen Zhongmin,et al. The Algorithm Design of Agent for Detecting and Analyzing Data in Intrusion Detection Based on Immune Principle , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[14] Azzedine Boukerche,et al. A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[15] Tao Li,et al. Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..
[16] Jean-Yves Le Boudec,et al. An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..
[17] Takeshi Okamoto,et al. Framework of an Immunity-Based Anomaly Detection System for User Behavior , 2007, KES.
[18] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[19] Wenjian Luo,et al. Designing Abstract Immune Mobile Agents for Distributed Intrusion Detection , 2005, 2005 International Conference on Neural Networks and Brain.
[20] Stephanie Forrest,et al. Immunity by design: an artificial immune system , 1999 .
[21] MisraSudip,et al. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008 .
[22] Davood Maleki,et al. An Intrusion Detection Technique using Co-Co Immune System for Distributed Data Networks (CoCo -ISD) , 2008 .
[23] Sudip Misra,et al. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..