IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Internetworking with TCP/IP (2nd ed.), vol. I
Internetworking with TCP/IP (2nd ed.), vol. I
Interconnections: bridges and routers
Interconnections: bridges and routers
The consensus problem in fault-tolerant computing
ACM Computing Surveys (CSUR)
Integrating security in inter-domain routing protocols
ACM SIGCOMM Computer Communication Review
A survey of intrusion detection techniques
Computers and Security
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Routing in communications networks
Digital signature protection of the OSPF routing protocol
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Securing information transmission by redundancy
Proceedings of the 1999 workshop on New security paradigms
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Sensor-based intrusion detection for intra-domain distance-vector routing
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
A Distributed Intrusion Detection System Based on Bayesian Alarm Networks
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Quality of service in mobile ad hoc networks
The handbook of ad hoc wireless networks
Security in sensor networks: watermarking techniques
Wireless sensor networks
SPV: secure path vector routing for securing BGP
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Hotspot-based traceback for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
IEEE Security and Privacy
Experimental analysis of attacks against intradomain routing protocols
Journal of Computer Security
Detecting and Isolating Malicious Routers
IEEE Transactions on Dependable and Secure Computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Transaction-based anomaly detection
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
A secure data transmission protocol for mobile ad hoc networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Impact of sanitized message flows in a cooperative intrusion warning system
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Detecting disruptive routers in wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Detection of unknown dos attacks by kolmogorov-complexity fluctuation
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A verified distance vector routing protocol for protection of internet infrastructure
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Performance analysis of modified secure link state routing protocol
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |