Improvement of Trust and Reputation using Intrusion Detection and Authentication in Ad Hoc Networks
暂无分享,去创建一个
[1] D. Lalitha Bhaskari,et al. Effective Hybrid Intrusion Detection System: A Layered Approach , 2015 .
[2] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[3] Vijay Varadharajan,et al. Designing secure wireless mobile ad hoc networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[4] Otto Carlos Muniz Bandeira Duarte,et al. Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.
[5] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[6] B. Muthukumar,et al. Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach , 2015 .
[7] Sachin Bojewar,et al. An Intrusion Detection System for MANETs , 2015 .
[8] Ingrid Moerman,et al. An overview of mobile ad hoc networks: applications and challenges , 2004 .
[9] Songwu Lu,et al. Securing a Wireless World , 2006, Proceedings of the IEEE.
[10] Mosa Ali Abu-Rgheff,et al. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.
[11] Sanjay Sharma,et al. Intrusion Detection System: A Review , 2015 .
[12] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[13] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.