共 39 条
- [11] Devi V.A., Bhuvaneswaran R.S., Agent based cross layer intrusion detection system for MANET, Advances in Network Security and Applications, 196, pp. 427-440, (2011)
- [12] Djenouri D., Mahmoudi O., Bouamama M., Llewellyn-Jones D., Merabti M., On securing MANET routing protocol against control packet dropping, Proceedings of the International Conference on Pervasive Services, pp. 100-108, (2007)
- [13] Dow C.R., Lin P.J., Chen S.C., Lin J.H., Recent developments and experimental guidelines in mobile ad-hoc networks, International Journal of Wireless and Mobile Computing, 4, 2, pp. 105-115, (2010)
- [14] Ghaemi H., Gonabad I., Estimating differential item functioning through logistic regression, Modern Journal of Language Teaching Methods, 1, 3, (2011)
- [15] Govindarajan M., Chandrasekaran R.M., Network intrusion detection using naive bayes, Computer Networks, 55, 8, pp. 1662-1671, (2007)
- [16] Gulati M.K., Kumar K., QoS routing protocols for mobile ad hoc networks: A survey, International Journal of Wireless and Mobile Computing, 5, 2, pp. 107-118, (2012)
- [17] Hall M., Frank E., Holmes G., Pfahringer B., Reutemann P., Witten I.H., The WEKA data mining software: An update, ACM SIGKDD Explorations Newsletter, 11, 1, pp. 10-18, (2009)
- [18] Huang Y.A., Fan W., Lee W., Philip S.Y., Cross-feature analysis for detecting ad-hoc routing anomalies, Proceedings of the 23rd International Conference on Distributed Computing Systems, pp. 478-487, (2003)
- [19] Huang Y.A., Lee W., A cooperative intrusion detection system for ad hoc networks, Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), pp. 135-147, (2003)
- [20] Jubin J., Tornow J.D., The DARPA packet radio network protocols, Proceedings of the IEEE, 75, 1, pp. 21-32, (1987)