Elements of information theory
Elements of information theory
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Location-aided routing (LAR) in mobile ad hoc networks
Wireless Networks
Machine Learning
Neural Fraud Detection in Mobile Phone Operations
IPDPS '00 Proceedings of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
A framework for wireless LAN monitoring and its applications
Proceedings of the 3rd ACM workshop on Wireless security
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Fast Distributed Outlier Detection in Mixed-Attribute Data Sets
Data Mining and Knowledge Discovery
Performance study of proactive flow handoff for mobile ad hoc networks
Wireless Networks
An efficient collaborative intrusion detection system for MANET using Bayesian Approach
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
A wireless intrusion detection method based on neural network
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
Impact of optimal MAC layer attacks on the network layer
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Classifier ensembles: Select real-world applications
Information Fusion
Interactive wormhole detection and evaluation
Information Visualization
A game-theoretic intrusion detection model for mobile ad hoc networks
Computer Communications
Modified AODV protocol for prevention of denial of service attacks in wireless ad hoc networks
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
International Journal of Knowledge-based and Intelligent Engineering Systems - Extended papers selected from KES-2006
Efficient signature based malware detection on mobile devices
Mobile Information Systems
A Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Secure Ubiquitous Health Monitoring System
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
A Novel Approach for Security and Robustness in Wireless Embedded Systems
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
Cybernetics and Systems
Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
Proceedings of the second ACM conference on Wireless network security
A weighted-dissimilarity-based anomaly detection method for mobile networks
Proceedings of the 2009 International Conference on Hybrid Information Technology
Real-time service provisioning for mobile and wireless networks
Computer Communications
Coding schemes for relay-assisted information embedding
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Wireless Communications
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
SAID: a self-adaptive intrusion detection system in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Building a trusted community for mobile ad hoc networks using friend recommendation
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
Securing the wireless LANs against internal attacks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A visualization framework for traffic data exploration and scan detection
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Time-based intrusion detection in cyber-physical systems
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems
Secure communication among cell phones and sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Static analysis of executables for collaborative malware detection on android
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
On achieving cost-sensitive anomaly detection and response in mobile ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Lightweight and distributed attack detection scheme in mobile ad hoc networks
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Wireless intrusion detection based on different clustering approaches
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Wireless mesh network security: A traffic engineering management approach
Journal of Network and Computer Applications
Simulations, models, and testbeds: A mutual catalysis
Performance Evaluation
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless Personal Communications: An International Journal
Intrusion detection in WSN-based intelligent transportation systems
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
A wireless intrusion detection system for secure clustering and routing in ad hoc networks
ISC'06 Proceedings of the 9th international conference on Information Security
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
An EFSM-based intrusion detection system for ad hoc networks
ATVA'05 Proceedings of the Third international conference on Automated Technology for Verification and Analysis
A two-tier intrusion detection system for mobile ad hoc networks – a friend approach
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A sophisticated solution for revealing attacks on wireless LAN
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
A new scheme for key management in ad hoc networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
On the security of wireless sensor networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A distributed intrusion detection scheme for wireless ad hoc networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing
IR, DR and BC with wireless mesh networks
Proceedings of the 2012 Information Security Curriculum Development Conference
Evaluation of classification algorithms for intrusion detection in MANETs
Knowledge-Based Systems
Journal of Network and Computer Applications
Distributed algorithms for the creation of a new distributed IDS in MANETs
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Performance analysis of machine learning algorithms for intrusion detection in MANETs
International Journal of Wireless and Mobile Computing
Algorithms for a distributed IDS in MANETs
Journal of Computer and System Sciences
International Journal of Ad Hoc and Ubiquitous Computing
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
Hi-index | 0.00 |
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.