Best-effort Data Leakage Prevention in inter-organizational tactical MANETs
暂无分享,去创建一个
[1] Simin Nadjm-Tehrani,et al. Adaptive real-time anomaly detection with incremental clustering , 2007, Inf. Secur. Tech. Rep..
[2] Johan Sigholm. Reconfigurable Radio Systems : Towards Secure Collaboration for Peace Support and Public Safety , 2010, ECIW 2010.
[3] Dong-You Choi,et al. A Novel Cross Layer Intrusion Detection System in MANET , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[4] Robert Koch. Towards next-generation Intrusion Detection , 2011, 2011 3rd International Conference on Cyber Conflict.
[5] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[6] Robert E. Donnelly,et al. Impact of the Network Environment on a Common Operating Environment , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[7] Stephen D. Wolthusen,et al. Efficient Trust Authority Distribution in Tactical MANET Environments , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[8] Victor Pomponiu,et al. Securing Wireless Ad Hoc Networks: State of the Art and Challenges , 2014 .
[9] Simin Nadjm-Tehrani,et al. Anomaly Detection in Water Management Systems , 2012, Critical Infrastructure Protection.
[10] Christos Xenakis,et al. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..
[11] Damien Lavaux,et al. Public Safety Situation Aware Services over Cognitive Radio Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[12] Simin Nadjm-Tehrani,et al. Hastily Formed Networks for Disaster Response: Technical Heterogeneity and Virtual Pockets of Local Order , 2009 .
[13] Javier Lopez,et al. Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense , 2012 .
[14] Marko Jahnke,et al. MITE – MANET Intrusion Detection for Tactical Environments , 2008 .
[15] Peter Xiaoping Liu,et al. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[16] Simin Nadjm-Tehrani,et al. ADWICE - Anomaly Detection with Real-Time Incremental Clustering , 2004, ICISC.
[17] Lars Löfgren,et al. Military Technology for Resource-Limited Time-Sensitive Targeting , 2010 .
[18] Tian Zhang,et al. BIRCH: an efficient data clustering method for very large databases , 1996, SIGMOD '96.
[19] Fredrik Maxen. A Comparative Analysis of Network Approaches for Tactical Wireless Communications, Validated by Joint Communication Simulation System (JCSS) Simulations: A Swedish Perspective , 2011 .