A SECURE INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORK
暂无分享,去创建一个
[1] Saswati Sarkar,et al. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[2] Sung-Ho Kim,et al. DDoS flooding attack detection through a step-by-step investigation , 2011, 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications.
[3] Sukumar Nandi,et al. QoS Aware Stable path Routing (QASR) Protocol for MANETs , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[4] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[5] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[7] S. S. Sherekar,et al. Study of Intrusion Detection Techniques in MANET , 2012 .
[8] Pramod K. Varshney,et al. TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[9] Dae-Wha Seo,et al. Intrusion detection based on traffic analysis in wireless sensor networks , 2010, The 19th Annual Wireless and Optical Communications Conference (WOCC 2010).
[10] David K. Y. Yau,et al. Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach , 2007, ASIACCS '07.
[11] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[12] Xiapu Luo,et al. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals , 2009, EURASIP J. Adv. Signal Process..
[13] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[14] Mohammad Najmud Doja,et al. Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs , 2008 .
[15] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[16] Chu-Hsing Lin,et al. Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).
[17] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[18] Y. Venkataramani,et al. DDoS Attack and Defense Scheme in Wireless Ad hoc Networks , 2011, ArXiv.
[19] Karen Sparck Jones,et al. The Key Concepts , 2004 .