On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks
暂无分享,去创建一个
[1] Hai Liu,et al. Fault-Tolerant Algorithms/Protocols in Wireless Sensor Networks , 2009, Guide to Wireless Sensor Networks.
[2] Ana R. Cavalli,et al. A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks , 2013, Mobile Networks and Applications.
[3] Saurabh Bagchi,et al. Optimal monitoring in multi-channel multi-radio wireless mesh networks , 2009, MobiHoc '09.
[4] David Hutchison,et al. OpenLIDS: a lightweight intrusion detection system for wireless mesh networks , 2009, MobiCom '09.
[5] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[6] Radu Stoleru,et al. Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[7] Geoffrey G. Xie,et al. RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks , 2014, Comput. Secur..
[8] Antonio Capone,et al. A framework for detecting selfish misbehavior in wireless mesh community networks , 2009, Q2SWinet '09.
[9] Ming Dong,et al. On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.
[10] Mary K. Vernon,et al. Mapping Internet Sensors with Probe Response Attacks , 2005, USENIX Security Symposium.
[11] Radu Stoleru,et al. On the optimality of cooperative intrusion detection for resource constrained wireless networks , 2013, Comput. Secur..
[12] Ala Altaweel,et al. Traffic-and-resource-aware intrusion detection in wireless mesh networks , 2014, Ad Hoc Networks.
[13] Qijun Gu,et al. Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[14] Peter Mell,et al. A denial-of-service resistant intrusion detection architecture , 2000, Comput. Networks.
[15] Devu Manikantan Shila,et al. Load-aware Traffic Engineering for Mesh Networks , 2007, 2007 16th International Conference on Computer Communications and Networks.
[16] Riccardo Bettati,et al. Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures , 2010, IEEE Transactions on Computers.
[17] Basem Shihada,et al. Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks , 2011, ADHOC-NOW.
[18] Vallipuram Muthukkumarasamy,et al. Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[19] Mieso K. Denko,et al. A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks , 2011, Comput. Commun..
[20] Matthias Hollick,et al. DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks , 2013, HotWiSec '13.
[21] Guofei Gu,et al. PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks , 2013, ICICS.