Distributed and Cooperative Anomaly Detection Scheme for Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[2] B Ng. Survey of Anomaly Detection Methods , 2006 .
[3] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[4] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.
[5] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[6] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[7] Qingbo Yang,et al. A Survey of Anomaly Detection Methods in Networks , 2009, 2009 International Symposium on Computer Network and Multimedia Technology.
[8] Yan Xiong,et al. Routing attacks detection and reaction scheme for mobile ad hoc networks using statistical methods , 2013, 2013 22nd Wireless and Optical Communication Conference.
[9] Tao Jiang,et al. Intrusion detection of in-band wormholes in MANETs using advanced statistical methods , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[10] H. J. Arnold. Introduction to the Practice of Statistics , 1990 .
[11] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[12] Peter Kruus,et al. In-Band Wormholes and Countermeasures in OLSR Networks , 2006, 2006 Securecomm and Workshops.
[13] Dongwoo Kim,et al. Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks , 2006 .
[14] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.