1 |
Thamilarasu, G., et al. "A cross-layer based intrusion detection approach for wireless ad hoc networks", Mobile Ad hoc and Sensor Systems Conference, 2005. IEEE International Conference on 2005
|
2 |
C. J. John Felix, A. Das, B.-C. Seet, and B.-S. Lee, "Cross Layer versus Single Layer Approaches for Intrusion Detection in MANET", IEEE International Conference on Networks 2007 (ICON 2007), Nov 2007
|
3 |
J. S. Baras and S. Radosavac, "Attacks and Defenses Utilizing Cross-Layer Interactions in MANET" , Workshop on Cross-Layer Issues in theDesign of Tactical Mobile Ad Hoc Wireless Networks: Integration of Communication and Networking Functions to Support Optimal Information Management, June 2–3, 2004, Naval Research Laboratory, Washington, DC
|
4 |
Y. Liu, Y. Li, and H. Man, "Short paper: A distributed cross-layer intrusion detection system for ad hoc networks", In Proc. IEEE/Create Net the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), pages 418-420, September 2005
|
5 |
C. J. John Felix, A. Das, B.-C. Seet, and B.-S. Lee, "CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs", IEEE Wireless Communications and Networking Conference (WCNC), Las Vegas, CA, USA, March 2008.
|
6 |
C. Loo, M. Ng, C. Leckie and M. Palaniswami. Intrusion Detection for Routing attacks in Sensor Networks. In International Journal of Distributed Sensor Networks, october-December 2006,2(4): 313-332
DOI
ScienceOn
|
7 |
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security. Kluwer (2002) and J. Oldmeadow, S. Ravinutala and C. Leckie, "Adaptive Clustering for Network Intrusion Detection."In Proceedings of the Third International Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2004), May 2004, pp. 255-259
|
8 |
OPNET modeler, http://www.opnet.com/
|
9 |
T. Phit and K. Abe, "Protocol Specification-based Intrusion Detection System for VoIP," Technical Report of IEICE, 2008
|