Framework for intrusion detection in IEEE 802.11 wireless mesh networks
暂无分享,去创建一个
[1] O. Kachirski,et al. Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.
[2] Amira Hamdi Shabaan,et al. Intrusion detection system in wireless ad-hoc networks based on mobile agent technology , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[3] Sajal K. Das,et al. Security Issues in Wireless Mesh Networks , 2008 .
[4] Kok-Keong Loo,et al. Real-Time Cross-Layer Design: Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks , 2009 .
[5] Fei Xing,et al. Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[6] Stephen Northcutt,et al. Network intrusion detection , 2003 .
[7] Stefan Schlott,et al. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.
[8] Thomas M. Chen,et al. Intrusion Detection in Wireless Mesh Networks , 2008 .
[9] Wu Yue,et al. Distributed intrusion detection for mobile ad hoc networks , 2008 .
[10] L. Javier García-Villalba,et al. A Modular Architecture for Distributed IDS in MANET , 2003, ICCSA.
[11] Ernesto Jiménez Caballero. Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem , 2006 .
[12] Giovanni Vigna,et al. An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.
[13] Howard Shrobe,et al. TIARA: Trust Management, Intrusion-tolerance, Accountability, and Reconstitution Architecture , 2007 .
[14] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[15] Joshua Wright,et al. Detecting Wireless LAN MAC Address Spoofing , 2003 .
[16] Shiyong Zhang,et al. Distributed Intrusion Detection for Mobile Ad Hoc Networks , 2005 .
[17] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[18] Marjan Kuchaki Rafsanjani,et al. Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes , 2008 .
[19] Ronald F. DeMara,et al. CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions , 2005, Autonomous Agents and Multi-Agent Systems.
[20] Abdul Azim Abdul Ghani,et al. Security Improvement for Management Frames in IEEE 802.11 Wireless Networks , 2007 .