Enhancing Key Management In Intrusion Detection System For Manets
暂无分享,去创建一个
[1] Christos Douligeris,et al. Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.
[2] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[3] Anupam Joshi,et al. Threshold-based intrusion detection in ad hoc networks and secure AODV , 2008, Ad Hoc Networks.
[4] Amitabh Mishra,et al. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.
[5] José Gerardo V. da Rocha,et al. Energy Harvesting From Piezoelectric Materials Fully Integrated in Footwear , 2010, IEEE Transactions on Industrial Electronics.
[6] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Khaldoun Al Agha,et al. Which Wireless Technology for Industrial Wireless Sensor Networks? The Development of OCARI Technology , 2009, IEEE Transactions on Industrial Electronics.
[9] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[10] Jin-Shyan Lee,et al. A Petri Net Design of Command Filters for Semiautonomous Mobile Sensor Networks , 2008, IEEE Transactions on Industrial Electronics.
[11] Katarina Stanoevska-Slabeva,et al. Impact of Mobile Ad Hoc Networks on the Mobile Value System , 2003 .
[12] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[13] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[14] Prabir Bhattacharya,et al. A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[15] Anupam Joshi,et al. On intrusion detection and response for mobile ad hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[16] Donald F. Towsley,et al. Design and analysis of a leader election algorithm for mobile ad hoc networks , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[17] Mohammad Mubasheer. EAACK—A Secure Intrusion-Detection System for MANETs , 2014 .
[18] Ashraf S. Hasan Mahmoud,et al. Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.
[19] S. A. M. Makki,et al. The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV) , 2004, Security and Management.
[20] Ahmadreza Tabesh,et al. A Low-Power Stand-Alone Adaptive Circuit for Harvesting Energy From a Piezoelectric Micropower Generator , 2010, IEEE Transactions on Industrial Electronics.
[21] Nidal Nasser,et al. Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[22] Sugata Sanyal,et al. Mobile Ad Hoc Network Security , 2009 .
[23] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .