1 |
B. J. Kim and I. K. Kim, "Kernel based intrusion detection system," Fourth Annual International Conference on Computer and Information Science (ACIS), pp.13-18, 2005.
|
2 |
Gahng-Seop Ahn, Andrew T. Campbell, Adnras Veres, Li-Hsiang Sun, "SWAN: Service Differentation in Stateless Wireless Ad Hoc Networks," in Proceedings of IEEE Twenty-First Annual Joing Conference of the IEEE Computer and Communications Societies, INFOCOM, Vol.2, 2002.
|
3 |
A. Mishra, K. Nadkarni, A. Patcha, "Intrusion Detection in Wireless Ad hoc Netoworks," Wireless Communications, IEEE, Vol.11, Issue 1, pp.48-60, 2004.
|
4 |
W. Zhang, et al, "Secure Routing in Ad hoc Networks and a related Intrusion Detection Problem," IEEE Military Conference (MILCOM), Vol.2, pp.735-740, 2003.
|
5 |
S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, "Detecting blackhole attack on aodv-based mobile ad-hoc networks by dynamic learning," International Journal of Network Security, Vol.4, no.3, pp.338-346, 2007.
|
6 |
D. Watkins, C. Scott, "Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad hoc networks," IEEE Wireless Communications and Networking Conference (WCNC), Vol.1, pp.622-627, 2004.
|
7 |
E.C.H. Ngai, M. R. Lyu, "Trust and clustering based authentication services in mobile ad hoc networks," 24th International Conference on Distributed Computing Systems Workshops, pp.582-587, 2004.
|