1 |
S. Corson and J. Macker, "Mobile ad hoc networking(MANET):routing protocol performance issues and evaluation considerations," IETF RFC2501, January 1999.
|
2 |
Y. Li and J. Wei, " Guidelines on Selecting Intrusion Detection Mothod in MANET," Proceedings of ISECON 2004, v 21 (NETWORK), pp. 1-17 , November 2004.
|
3 |
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C-Y. Tseng, T. Bowen, K. Levitt and J. Rowe, "A General Cooperative Intrusion Detection Architecture for MANETs," Proceedings of the third IEEE International Workshop on Information Assurance, IWIA'05, pp. 57-70, March 2005.
|
4 |
H. Debar, M. Dacier, and A. Wespi, "A Revised Taxonomy for Intrusion Detection Systems," Annales des Telecommunications, Vol. 55, No.7-8, pp. 361-378, August 2000.
|
5 |
W. Stallings, Cryptography and Network Security - Principles and Practices, 3rd edition , Person Education, Aug. 2003.
|
6 |
A. Mishra, K. Nadkarni, amd A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Communications, Vol. 11, No.1, pp. 48-60, February 2004.
|
7 |
B. Sun, K.Wu, and U. W. Pooch. "Alert Aggregation in Mobile Ad Hoc Networks". The 2003 ACM Workshop on Wireless Security in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom'03), pp. 69-78, September 2003.
|