Hybrid architecture with misuse and anomaly detection techniques for wireless networks
暂无分享,去创建一个
E. Vishnu Balan | M. K. Priyan | C. Gokulnath | G. Usha Devi | G. Usha Devi | C. Gokulnath | E. Balan
[1] Xu Qiao-ping,et al. Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .
[2] Mohammad Zulkernine,et al. DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.
[3] Mohammad Saiful Islam Mamun,et al. Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network , 2010, ArXiv.
[4] Donald F. Towsley,et al. Mobility improves coverage of sensor networks , 2005, MobiHoc '05.
[5] Patrick Thiran,et al. Delay of intrusion detection in wireless sensor networks , 2006, MobiHoc '06.
[6] Kenichi Yoshida,et al. Entropy based intrusion detection , 2003, 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003) (Cat. No.03CH37490).
[7] M. Asaka,et al. A method of tracing intruders by use of mobile agents , 1999 .
[8] Muhammad Usman,et al. Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks , 2012 .
[9] Xin Chen,et al. Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[10] Wayne A. Jansen,et al. Intrusion detection with mobile agents , 2002, Comput. Commun..
[11] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[12] Hossein Jadidoleslamy,et al. A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS , 2011 .
[13] Bharat Bhargava,et al. On vulnerability and protection of ad hoc on-demand distance vector protocol , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..
[14] Dharma P. Agrawal,et al. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[15] J.A. Ritcey,et al. Probabilistic Detection of Mobile Targets in Heterogeneous Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.