A Survey on VANET Intrusion Detection Systems
暂无分享,去创建一个
[1] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[2] Khaled Masmoudi,et al. An Identity-Based Key Management Framework for Personal Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[3] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[4] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[5] M. Jerbi,et al. Protocoles pour les communications dans les réseaux de véhicules en environnement urbain : routage et geocast basés sur les intersections , 2008 .
[6] Udo W. Pooch,et al. Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.
[7] R. Sunder,et al. WIRELESS NODE BEHAVIOR BASED INTRUSION DETECTION USING GENETIC ALGORITHM , 2007 .
[8] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[9] Wenke Lee,et al. Intrusion Detection , 2013 .
[10] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[11] M. Suganthi,et al. Wireless Node Misbehavior Detection Using Genetic Algorithm , 2008 .
[12] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[13] David A. Maltz,et al. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.
[14] Saswati Sarkar,et al. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[15] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[16] Jaydip Sen,et al. An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.
[17] Shiyong Zhang,et al. Distributed Intrusion Detection for Mobile Ad Hoc Networks , 2005 .