Defence Against 802.11 DoS Attacks Using Artificial Immune System
暂无分享,去创建一个
[1] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[2] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[3] Muddassar Farooq,et al. BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc , 2007, ICARIS.
[4] Horst F. Wedde,et al. BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by Artificial Immune Systems , 2006, PPSN.
[5] Jonathan Timmis,et al. Artificial immune systems - a new computational intelligence paradigm , 2002 .
[6] John C. Mitchell,et al. Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.
[7] Tom Fawcett,et al. ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .
[8] Jean-Yves Le Boudec,et al. An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..
[9] Muhammad Zubair Shafiq,et al. Extended thymus action for reducing false positives in ais based network intrusion detection systems , 2007, GECCO '07.
[10] A. Nur Zincir-Heywood,et al. 802.11 De-authentication Attack Detection Using Genetic Programming , 2006, EuroGP.
[11] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[12] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[13] A. Nur Zincir-Heywood,et al. 802.11 network intrusion detection using genetic programming , 2005, GECCO '05.
[14] A. Nur Zincir-Heywood,et al. Genetic programming based WiFi data link layer attack detection , 2006, 4th Annual Communication Networks and Services Research Conference (CNSR'06).
[15] Muhammad Zubair Shafiq,et al. Extended thymus action for improving response of AIS based NID system against malicious traffic , 2007, 2007 IEEE Congress on Evolutionary Computation.
[16] D. Dasgupta,et al. A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks , 2006 .
[17] Wen-Nung Tsai,et al. Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks , 2009, J. Inf. Sci. Eng..