Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
暂无分享,去创建一个
[1] John A. Clark,et al. Intrusion Detection in Mobile Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.
[2] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[3] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[4] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[5] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[6] Aikaterini Mitrokotsa,et al. Intrusion Detection with Neural Networks and Watermarking Techniques for MANET , 2007, IEEE International Conference on Pervasive Services.
[7] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[8] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[9] Shiyong Zhang,et al. Flooding attack and defence in Ad hoc networks , 2006 .
[10] Djamel Djenouri,et al. On Securing MANET Routing Protocol Against Control Packet Dropping , 2007, IEEE International Conference on Pervasive Services.
[11] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, Ad Hoc Networks.
[12] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[13] Yang Li,et al. MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.