暂无分享,去创建一个
[1] D. Dasgupta,et al. Mobile security agents for network traffic analysis , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[2] Vasant Honavar,et al. Lightweight agents for intrusion detection , 2003, J. Syst. Softw..
[3] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[4] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[5] Chris Hanson,et al. Amorphous computing , 2000, Commun. ACM.
[6] Martin Nilsson,et al. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[7] Stefan Axelsson. Research in Intrusion-Detection Systems: A Survey , 1998 .
[8] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[9] Prasant Mohapatra,et al. Power conservation and quality of surveillance in target tracking sensor networks , 2004, MobiCom '04.
[10] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[11] Edson dos Santos Moreira,et al. Implementation of an intrusion detection system based on mobile agents , 2000, 2000 Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems.
[12] Hossam S. Hassanein,et al. Power-aware wireless mobile ad hoc networks , 2003 .
[13] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[14] Qin Yang,et al. The research on dynamic self-adaptive network security model based on mobile agent , 2000, Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000.
[15] P. R. Kumar,et al. Power Control in Ad-Hoc Networks: Theory, Architecture, Algorithm and Implementation of the COMPOW Protocol , 2002 .
[16] Tarek F. Abdelzaher,et al. Towards optimal sleep scheduling in sensor networks for rare-event detection , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[17] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[18] T. Srinivasan,et al. A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks , 2005, ICCNMC.
[19] Pokkuluri Kiran Sree,et al. Improving Quality of Clustering using Cellular Automata for Information retrieval , 2014, ArXiv.
[20] Boon-Chong Seet,et al. The Handbook of Ad Hoc Wireless Networks , 2002 .
[21] Hasan Mahmood,et al. Power Control in Ad Hoc Networks , 2011 .