A Novel Cross Layer Intrusion Detection System in MANET
暂无分享,去创建一个
[1] Kôki Abe,et al. Protocol specification-based intrusion detection system for VoIP (情報ネットワーク) , 2008 .
[2] Hong Man,et al. A distributed cross-layer intrusion detection system forad hoc networks , 2006, Ann. des Télécommunications.
[3] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[4] Song Jian-hua,et al. Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks , 2007, 2007 Second International Conference on Communications and Networking in China.
[5] Charles E. Perkins,et al. Mobile IP Authentication, Authorization, and Accounting Requirements , 2000, RFC.
[6] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[7] Yang Li,et al. Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[8] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[9] Bu-Sung Lee,et al. CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[10] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[11] Bu-Sung Lee,et al. Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs , 2007, 2007 15th IEEE International Conference on Networks.
[12] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[13] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[14] Xu Qiao-ping,et al. Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .
[15] Tai Hoon Kim. AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKS , 2008 .
[16] John S. Baras,et al. Attacks and Defenses Utilizing Cross-Layer Interactions in MANET , 2004 .
[17] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[18] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[19] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[20] Andrea J. Goldsmith,et al. Design challenges for energy-constrained ad hoc wireless networks , 2002, IEEE Wirel. Commun..