1 |
유응구, "MANET에서의 에너지를 고려한 라우팅 프로토콜," 디지털산업정보학회, 디지털산업정보학회논문지 제3권, 제3호, 2007.
|
2 |
Yongguang Zhang, Wenke Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," Proceedings of the sixth international conference on Mobile Computing and Networking(MobiCom 2000), Boston, MA, August 2000.
|
3 |
최윤정, "침입탐지시스템의 정확도 향상을 위한 개선된 데이터마이닝 방법론," 디지털산업정보학회, 디지털산업정보학회논문지 제6권, 제1호, 2010.
|
4 |
Salvatore J. Stolfo, et al., "Anomaly Detection in Computer Security and an Application to File System Accesses," Proceedings of 15th International Symposium of Foundations of Intelligent Systems, 2005.
|
5 |
Shi Zhong, Taghi M. Khoshgoftaar, and Naeem Seluya, "Evaluating Clustering Techniques for Network Intrusion Detection," In Proceeding of the 10th ISSAT International Conference on Reliability and Quality and Design, Las Vegas, Nevada, 2004, pp. 149-155.
|
6 |
Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: A defense aginst wormhole attacks in wireless networks," In Proceeding of IEEE Infocomm, 2003, pp. 349-364.
|
7 |
J. Deng, R. Han, and S. Mishra, "A performance evaluation of intrusion-tolerant routing in wireless sensor networks," In Proceeding of IEEE 2nd Int'l Workshop on info Processing in Sensor Networks, April 2003.
|