An Optimal Method for Detecting Internal and External Intrusion in MANET
暂无分享,去创建一个
[1] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[2] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[3] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[4] Prabir Bhattacharya,et al. A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[5] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[6] P. Morris. Introduction to Game Theory , 1994 .
[7] Macia-FernandezG.,et al. Anomaly-based network intrusion detection , 2009 .
[8] Lata Narayanan,et al. Games to induce specified equilibria , 2008, Theor. Comput. Sci..
[9] Marco Aldinucci,et al. Computational Science - ICCS 2008, 8th International Conference, Kraków, Poland, June 23-25, 2008, Proceedings, Part I , 2008, ICCS.
[10] Yang Xiao,et al. Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.
[11] Chuang Lin,et al. Game-Based Trust Establishment for Mobile Ad Hoc Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[12] Prabir Bhattacharya,et al. A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..
[13] A. Patcha,et al. A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[14] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[15] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[16] Meng Wu,et al. A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[17] Prabir Bhattacharya,et al. A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[18] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[19] Orhan Dagdeviren,et al. A Hierarchical Leader Election Protocol for Mobile Ad Hoc Networks , 2008, ICCS.