Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
暂无分享,去创建一个
[1] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[2] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[3] Marco Richeldi,et al. ADHOC: a tool for performing effective feature selection , 1996, Proceedings Eighth IEEE International Conference on Tools with Artificial Intelligence.
[4] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[5] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[6] Seungjin Choi,et al. Independent Component Analysis , 2009, Handbook of Natural Computing.
[7] Xia Wang,et al. Feature Selection in Intrusion Detection System over Mobile Ad-hoc Network , 2005 .
[8] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[9] Srikanth V. Krishnamurthy,et al. Ad Hoc Networks: Technologies And Protocols , 2009, ADHOCNETS 2010.
[10] Juha Karhunen,et al. Generalizations of principal component analysis, optimization problems, and neural networks , 1995, Neural Networks.
[11] Saswati Sarkar,et al. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[12] T.F. Lunt,et al. Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[13] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[14] Yasser Kamal Hassan,et al. Performance Evaluation of Mobility Speed over MANET Routing Protocols , 2010, Int. J. Netw. Secur..
[15] M.Z. Rahman,et al. Learning intrusion detection based on adaptive bayesian algorithm , 2008, 2008 11th International Conference on Computer and Information Technology.
[16] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[17] Nong Ye,et al. Statistical process control for computer intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[18] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[19] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[20] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[21] Qiang Yang,et al. Document Transformation for Multi-label Feature Selection in Text Categorization , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[22] H. Hotelling. Analysis of a complex of statistical variables into principal components. , 1933 .
[23] E. Oja,et al. Independent Component Analysis , 2013 .
[24] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[25] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[26] Paul Gray,et al. Introduction to Data Mining and Knowledge Discovery , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[27] Byung-Joo Kim,et al. Kernel based intrusion detection system , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).