1 |
A. Patwardham, J. Parker, A. Joshi, A. Karygiannis, M. Iorga, "Secure Routing and Intrusion Detection in Ad Hoc Networks," Third IEEE International Conference on Pervasive Computing and Communications, pp 191-199, 2005.
|
2 |
L. Buttyan, J. P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," ACM Journal for Mobile Networks (MONET), pp.570-592, 2003.
|
3 |
Fogla, P. and Lee, W., "Evading network anomaly detection systems: formal reasoning and practical techniques. In Proc of. ACM Conference on Computer and Communications Security (CCS), pp.59-68, 2006.
|
4 |
A. Rajaram, S. Palaniswami, "Malicious node detection system for mobile ad hoc networks," IJCSIT International Journal of Computer Science and Information Technologies, pp.77-85, 2010.
|
5 |
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C. Tseng, T. Bowen, K. Levitt, J. Rowe, "A general cooperative intrusion detection architecture for manets," Proceedings of the 3rd IEEE IWIA, pp. 57-70, 2005.
|
6 |
N. Nasser, Y. Chen, "Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks," ICC '07. IEEE International Conference on Communications, pp.1154-1159, 2007.
|
7 |
P.M. Mafra, V. Moll, J.S. Fraga, A.O. Santin, "Octopus-IIDS: An anomaly based intelligent intrusion detection system," ISCC, Italy, pp.405-410, 2010.
|