Intrusion detection in wireless ad-hoc networks
Top Cited Papers
- 1 August 2000
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 275-283
- https://doi.org/10.1145/345910.345958
Abstract
No abstract availableThis publication has 7 references indexed in Scilit:
- Dynamic Source Routing in Ad Hoc Wireless NetworksPublished by Springer Nature ,2007
- The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networksIEEE Journal on Selected Areas in Communications, 1999
- Temporal sequence learning and data reduction for anomaly detectionACM Transactions on Information and System Security, 1999
- A review of current routing protocols for ad hoc mobile wireless networksIEEE Wireless Communications, 1999
- Securing ad hoc networksIEEE Network, 1999
- State transition analysis: a rule-based intrusion detection approachIEEE Transactions on Software Engineering, 1995
- Experience with Disconnected Operation in a Mobile Computing EnvironmentPublished by Defense Technical Information Center (DTIC) ,1993