Author:
Sonekar Shrikant V.,Kshirsagar Manali M.,Malik Latesh
Reference19 articles.
1. Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: Proceedings of the 6th International Conference on Mobile Computing and Networking (Mobi-Com 2000)
2. Perkins, C.E.: Ad Hoc Networking, pp. 198–264. Addison-Wesley, New York (2001)
3. Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing and Applications, vol. 3, pp. 99–100. New Orleans, LA, USA (1999)
4. Successful Real-time Security Monitoring. Riptech Inc. White paper (September 2001)
5. Lazarevic, A., Ozgur, A., Ertoz, L., et al.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 2003 SIAM International Conference on Data Mining, pp. 25–36. Society for Industrial and Applied Mathematics (1 May 2003)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献