Author:
Satam Shalaka,Satam Pratik,Pacheco Jesus,Hariri Salim
Funder
National Institute of Standards and Technology
Air Force Office of Scientific Research
National Science Foundation
U.S. Department of Energy
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference32 articles.
1. Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Privacy 9(3), 49–51 (2011). https://doi.org/10.1109/MSP.2011.67
2. Satam, P., Hariri, S.: WIDS: an anomaly based intrusion detection system for Wi-Fi (IEEE 80.211) Protocol. IEEE Trans. Netw. Serv. Manage. 18(1), 1077–1091 (2021). https://doi.org/10.1109/TNSM.2020.3036138
3. Alipour, H., Al-Nashif, Y.B., Satam, P., Hariri, S.: Wireless anomaly detection based on IEEE 80.211 behavior analysis. IEEE Trans. Inf. Forensics Secur. 10(10), 2158–2170 (2015). https://doi.org/10.1109/TIFS.2015.2433898
4. Al-Nashif, Y., Kumar, A.A., Hariri, S., Qu, G., Luo, Y., Szidarovsky, F.: Multi-level intrusion detection system (ML-IDS). In: 5th International Conference on Autonomic Computing, ICAC 2008, pp. 131–140 (2008). https://doi.org/10.1109/ICAC.2008.25
5. Satam, P., Alipour, H., Al-Nashif, Y., Hariri, S.: Anomaly behavior analysis of DNS protocol. J. Internet Serv. Inf. Secur. JISIS 5(4), 85–97 (2015)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献