共 50 条
- [21] Using attack graphs in ad hoc networks - For intrusion predictor correlation and detection [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 63 - +
- [22] Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
- [23] An approach to mitigate wormhole attack in wireless ad hoc networks [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 220 - +
- [24] A Novel Intrusion Detection System for Ad Hoc Flooding Attack Using Fuzzy Logic in Mobile Ad Hoc Networks [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
- [25] Sybil Attack Prevention and Detection in Vehicular Ad hoc Network [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 594 - 599
- [27] Research on Intrusion Detection Technique of Mobile Ad Hoc Network Security [J]. MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2483 - 2488
- [28] On the anomaly intrusion-detection in mobile ad hoc network environments [J]. PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2006, 4217 : 182 - 193
- [29] Three Phase Technique for Intrusion Detection in Mobile Ad Hoc Network [J]. DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 : 675 - 684
- [30] The Intrusion Detection Model Based on the Fuzzy Judgment in Ad Hoc Network [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2886 - 2889