1 |
Butun, I., Morgere, S.D., Sankar, R., "A survey of intrusion detection system in wireless sensor networks," IEEE Communication System, Tutorials 16(1), 2014.
|
2 |
Kaur, J., Lindskog, D., Zavarsky, P., "An algorithm to facilitate intrusion response in mobile ad hoc networks," Proceedings of the 9th International Conference on Security of Information and Networks, 2016.
|
3 |
고장혁, 이동호, "네트워크 트래픽 수집 및 복원을 통한 내부자 행위 분석 프레임워크 연구," 디지털산업정보학회지, 제13권, 제4호, 2017, pp. 125-135.
|
4 |
Nguyen, H.L., Nguyen, U.T., "A study of different types of attacks in mobile adhoc networks," 25th IEEE Canadian Conference on Electrical Computer Engineering(CCEC), 2012.
|
5 |
이세열, "자가적응모듈과 퍼지인식도가 적용된 하이브리드 침입시도탐지모델," 디지털산업정보학회지, 제13권, 제3호, 2017, pp. 19-25.
|
6 |
석선우, 최승원, "Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol," 디지털산업정보학회지, 제13권, 제1호, 2017, pp. 57-101.
|
7 |
R. M. Chamudeeswari, P. Sumathi, "Security attacks on Routing protocols and Intrusion Detection in MANET," International Journal of Scientific Research and Management, Vol.5, 2015, pp. 7067-7073.
|
8 |
Sahana, S., Saha, S., Das Gupta, S., " Weight based hierarchical clustering algorithm for mobile ad hoc networks," Procedia Eng., No. 38, 2012, pp. 1084-1093.
|
9 |
Han-Chao Lee, Shin-Ming Cheng, Kuo-Ping Wu, "A responsive probing approach to detect dynamic intrusion in a MANET," IEEE, Vol. 3, No. 2, 2016, pp. 243-259.
|
10 |
Badie, A.M., Lindskog, D., Zavarsky, P., "Responding to intrusions in mobile ad hoc networks," World Congress on Internet Security(WorldCIS-2013), 2013, pp. 30-34.
|
11 |
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, "Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method," International Journal of Network Security, Vol.5, No.3, 2007, pp. 338-346.
|
12 |
Latha Tamilselvan, V. Sankaranarayanan, "Prevention of Co-operative Black Hole Attack in MANET," International Journal of Networks, Vol. 3, No. 5, 2008, pp. 13-20.
|