Challenges in intrusion detection for wireless ad-hoc networks
- 27 August 2003
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- A new intrusion detection method based on process profilingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Detecting disruptive routers: a distributed network monitoring approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Execution monitoring of security-critical programs in distributed systems: a specification-based approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Adaptive security for multilevel ad hoc networksWireless Communications and Mobile Computing, 2002
- Performance analysis of the CONFIDANT protocolPublished by Association for Computing Machinery (ACM) ,2002
- System Health and Intrusion Monitoring Using a Hierarchy of ConstraintsLecture Notes in Computer Science, 2001
- Mitigating routing misbehavior in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Intrusion detection in wireless ad-hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Protecting routing infrastructures from denial of service using cooperative intrusion detectionPublished by Association for Computing Machinery (ACM) ,1997
- Cooperating security managers: Distributed intrusion detection systemsComputers & Security, 1996