Location estimation of an intruder in wireless ad hoc networks
暂无分享,去创建一个
[1] H.T. Friis,et al. A Note on a Simple Transmission Formula , 1946, Proceedings of the IRE.
[2] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[3] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[4] Zheng Zhang,et al. HIDE : a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[5] Garrison W. Greenwood,et al. Localization using evolution strategies in sensornets , 2005, 2005 IEEE Congress on Evolutionary Computation.
[6] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[7] Jun Zheng,et al. An Anomaly Intrusion Detection System Based on Vector Quantization , 2006, IEICE Trans. Inf. Syst..
[8] B. R. Badrinath,et al. Localized positioning in ad hoc networks , 2003, Ad Hoc Networks.
[9] Hisato Iwai,et al. Self-Organizing Location Estimation Method using Ad-hoc Networks , 2006, 7th International Conference on Mobile Data Management (MDM'06).
[10] Hitesh Tewari,et al. Real-time intrusion detection for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.