Lightweight and distributed attack detection scheme in mobile ad hoc networks
暂无分享,去创建一个
Anang Hudaya Muhamad Amin | Amiza Amir | Asad I. Khan | Raja Azlina Raja Mahmood | A. Amir | A. Amin | R. Mahmood
[1] Azzedine Boukerche,et al. A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[2] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[3] Asad I. Khan,et al. A Hierarchical Graph Neuron Scheme for Real-Time Pattern Recognition , 2008, IEEE Transactions on Neural Networks.
[4] Erland Jonsson,et al. Survey of Intrusion Detection Research , 2002 .
[5] Udo W. Pooch,et al. Routing anomaly detection in mobile ad hoc networks , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).
[6] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.
[7] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[8] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[9] M. Gerla,et al. P 2 P MANETs – New Research Issues , 2005 .
[10] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[11] Esa Alhoniemi,et al. Self-Organizing Map for Data Mining in MATLAB: The SOM Toolbox , 1999 .
[12] Michael R. Lyu,et al. Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[13] Asad I. Khan,et al. A peer-to-peer associative memory network for intelligent information systems , 2002 .
[14] Hongxia Xie,et al. Notice of Violation of IEEE Publication PrinciplesAn Intrusion Detection Architecture for Ad Hoc Network Based on Artificial Immune System , 2006, 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06).
[15] Wei Sat,et al. Guidelines on Selecting Intrusion Detection Methods in MANET , 2004 .
[16] R.A. Raja Mahmood,et al. A Distributed Hierarchical Graph Neuron-Based Classifier: An Efficient, Low-Computational Classifier , 2008, 2008 First International Conference on Intelligent Networks and Intelligent Systems.
[17] Calvin Ko,et al. Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[18] Lixin Xu,et al. An intrusion detection system model based on self-organizing map , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[19] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[20] Antony I. T. Rowstron,et al. P2P MANET's - New Research Issues , 2005, Peer-to-Peer Mobile Ad Hoc Networks.
[21] Cheng Zhang,et al. Network Intrusion Active Defense Model Based on Artificial Immune System , 2008, 2008 Fourth International Conference on Natural Computation.
[22] A. Karygiannis,et al. Host-based network monitoring tools for MANETs , 2006, PE-WASUN '06.
[23] Anang Hudaya Muhamad Amin,et al. One Shot Associative Memory Method for Distorted Pattern Recognition , 2007, Australian Conference on Artificial Intelligence.
[24] Jinyuan You,et al. POM-a mobile agent security model against malicious hosts , 2000, Proceedings Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region.
[25] Stephanie Forrest,et al. Immunity by design: an artificial immune system , 1999 .
[26] Teuvo Kohonen,et al. Self-Organizing Maps, Third Edition , 2001, Springer Series in Information Sciences.