Distributed Court System for intrusion detection in mobile ad hoc networks
暂无分享,去创建一个
Chai Kiat Yeo | Da Zhang | Da Zhang | C. Yeo
[1] Songwu Lu,et al. SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[2] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[3] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[4] Jian Li,et al. PANDA: A novel mechanism for flooding based route discovery in ad hoc networks , 2006, Wirel. Networks.
[5] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[6] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[7] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, Ad Hoc Networks.
[8] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[9] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[10] Udo W. Pooch,et al. Zone-Based Intrusion Detection for Mobile Ad Hoc Networks , 2006, Ad Hoc Sens. Wirel. Networks.
[11] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[12] Ralf Steinmetz,et al. On the effect of node misbehavior in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[13] Chai Kiat Yeo,et al. A Novel Architecture of Intrusion Detection System , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[14] Bruno O. Shubert,et al. Random variables and stochastic processes , 1979 .
[15] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[16] Adrian Perrig,et al. Proceedings of the 2nd ACM workshop on Wireless security , 2003 .
[17] Reza Curtmola,et al. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.
[18] Abbas Jamalipour,et al. SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[19] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[20] Danny Dhillon,et al. Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs , 2006, IWCMC '06.
[21] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[22] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[23] S. Buchegger,et al. A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .
[24] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[25] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[26] S. Buchegger,et al. Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[27] Farouk Kamoun,et al. CASAN: Clustering algorithm for security in ad hoc networks , 2008, Comput. Commun..
[28] Jon Crowcroft,et al. Proceedings of the conference on Communications architectures, protocols and applications , 1994, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
[29] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.