共 39 条
- [1] Albers P., Camp O., Percher J.M., Jouga B., Me L., Puttini R., Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches, Proceedings of the 1st International Workshop on Wireless Information Systems, pp. 1-12, (2002)
- [2] Al-Shurman M., Yoo S.-M., Park S., Black-hole attack in mobile ad hoc networks, Proceedings of the 42nd Annual Southeast Regional Conference, pp. 96-97, (2004)
- [3] Anderson J.P., Computer Security Threat Monitoring and Surveillance, 17, (1980)
- [4] Anjum F., Mouchtaris P., Security for Wireless Ad Hoc Networks, (2007)
- [5] Bajaj L., Takai M., Ahuja R., Tang K., Bagrodia R., Gerla M., GloMoSim: A Scalable Network Simulation Environment, (1999)
- [6] Burchfiel J., Tomlinson R., Beeler M., Functions and structure of a packet radio station, AFIPS Conference Proceedings, pp. 245-251, (1975)
- [7] Chaba Y., Singh Y., Aneja P., Performance analysis of disable ip broadcast technique for prevention of flooding-based DDoS attack in MANET, Journal of Networks, 4, 3, pp. 178-183, (2009)
- [8] Cheng B.C., Tseng R.Y., A context adaptive intrusion detection system for MANET, Computer Communications, 34, 3, pp. 310-318, (2011)
- [9] Darji M., Trivedi B., Secure leader election algorithm optimized for power saving using mobile agents for intrusion detection in MANET, Recent Trends in Computer Networks and Distributed Systems Security, 335, pp. 54-63, (2012)
- [10] Denning D.E., An intrusion-detection model, IEEE Transactions on Software Engineering, 13, 2, pp. 222-232, (1987)