共 26 条
[1]
BALASUBRAMANIYA.J, 1998, 9805 PURD U DEP COMP
[2]
BRAEM B, 2008, USING THREADING SUN
[3]
ESTRIN D, 2004, IEEE COMPUTER SO AUG
[4]
GORODETSKY V, 2007, MULTIAGENT PEER TO P, P260
[5]
Using mobile agents for intrusion detection in wireless ad hoc networks
[J].
2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS,
2005,
:362-366
[6]
Jansen W., 2002, COMPUTER COMMUNICATI, V25
[7]
Kabiri Peyman., 2005, IJ Network Security, V1, P84
[8]
Intrusion detection using mobile agents in wireless ad hoc networks
[J].
IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS,
2002,
:153-158
[9]
Karlof C, 2003, PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, P113, DOI 10.1109/snpa.2003.1203362
[10]
KRONTIRIS I, 2008, P ACM SECURECOMM