ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Distributed combined authentication and intrusion detection with data fusion in high security mobile ad-hoc networks
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE
◽
10.1109/milcom.2010.5680201
◽
2010
◽
Author(s):
Shengrong Bu
◽
F. Richard Yu
◽
X. Liu Peter
◽
Helen Tang
◽
Peter Mason
Keyword(s):
Intrusion Detection
◽
Data Fusion
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
High Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
IEEE Transactions on Vehicular Technology
◽
10.1109/tvt.2010.2103098
◽
2011
◽
Vol 60
(3)
◽
pp. 1025-1036
◽
Cited By ~ 37
Author(s):
Shengrong Bu
◽
F. Richard Yu
◽
Xiaoping P. Liu
◽
Peter Mason
◽
Helen Tang
Keyword(s):
Intrusion Detection
◽
Data Fusion
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
High Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks
IEEE Transactions on Wireless Communications
◽
10.1109/twc.2009.071036
◽
2009
◽
Vol 8
(2)
◽
pp. 806-815
◽
Cited By ~ 44
Author(s):
Jie Liu
◽
F. Richard Yu
◽
Chung-Horng Lung
◽
Helen Tang
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Continuous Authentication
◽
High Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks
IEEE Transactions on Wireless Communications
◽
10.1109/twc.2011.071411.102123
◽
2011
◽
Vol 10
(9)
◽
pp. 3064-3073
◽
Cited By ~ 31
Author(s):
Shengrong Bu
◽
F. Richard Yu
◽
Xiaoping P. Liu
◽
Helen Tang
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
User Authentication
◽
High Security
◽
Continuous User
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Enhanced intrusion detection techniques for mobile ad hoc networks
IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007)
◽
10.1049/ic:20070757
◽
2007
◽
Cited By ~ 4
Author(s):
L.P. Rajeswari
◽
R.A.X. Annie
◽
A. Kannan
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Techniques
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks
2011 IEEE International Conference on Communications (ICC)
◽
10.1109/icc.2011.5962858
◽
2011
◽
Cited By ~ 3
Author(s):
Shengrong Bu
◽
F. Richard Yu
◽
Peter X. Liu
◽
Helen Tang
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Efficient Method
◽
Ad Hoc
◽
Computationally Efficient
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS
Journal of Computer Science
◽
10.3844/jcssp.2013.521.525
◽
2013
◽
Vol 9
(4)
◽
pp. 521-525
◽
Cited By ~ 2
Author(s):
Vydeki
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Intrusion Detection System
◽
Ad Hoc
◽
Detection System
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
Information Fusion
◽
10.1016/j.inffus.2007.03.001
◽
2008
◽
Vol 9
(1)
◽
pp. 96-119
◽
Cited By ~ 45
Author(s):
João B.D. Cabrera
◽
Carlos Gutiérrez
◽
Raman K. Mehra
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Ensemble Methods
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Survey on Intrusion Detection in Mobile Ad Hoc Networks
Wireless Network Security - Signals and Communication Technology
◽
10.1007/978-0-387-33112-6_7
◽
2007
◽
pp. 159-180
◽
Cited By ~ 59
Author(s):
Tiranuch Anantvalee
◽
Jie Wu
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Self-Organizing Distributed Intrusion Detection in Mobile Ad Hoc Networks
Advances in Soft Computing - Soft Computing as Transdisciplinary Science and Technology
◽
10.1007/3-540-32391-0_31
◽
2007
◽
pp. 233-242
Author(s):
James Cannady
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Distributed Intrusion Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Self Organizing
Download Full-text
Towards adaptive intrusion detection in mobile ad hoc networks
IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.
◽
10.1109/glocom.2004.1379027
◽
2005
◽
Cited By ~ 10
Author(s):
Bo Sun
◽
Kui Wu
◽
U.W. Pooch
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close