Amanote Research
Register
Sign In
USING ATTACK GRAPHS IN AD HOC NETWORKS - For Intrusion Prediction Correlation and Detection
doi 10.5220/0002097700630068
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2006
Authors
Unknown
Publisher
SciTePress - Science and and Technology Publications
Related search
Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
Improvement of Trust and Reputation Using Intrusion Detection and Authentication in Ad Hoc Networks
International Journal of Security and its Applications
Computer Science
An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks
Mobile Information Systems
Computer Networks
Computer Science Applications
Communications
An Intrusion Detection Tool for AODV-Based Ad Hoc Wireless Networks
A Survey on Intrusion Detection Systems in Mobile Ad-Hoc Networks
IJARCCE
Survey on Detection and Prevention Scheme for Flooding Attack in Ad-Hoc Networks
International Journal of Modern Trends in Engineering & Research
Route Inference Based Sinkhole Attack Detection System for Mobile Ad Hoc Networks
International Journal of Innovative Technology and Exploring Engineering
Mechanics of Materials
Electronic Engineering
Civil
Structural Engineering
Electrical
Computer Science
Intrusion Alert Prioritisation and Attack Detection Using Post-Correlation Analysis
Computers and Security
Law
Computer Science
A Study on Various Attacks and Attack Detection Methods in Mobile Ad-Hoc Networks
International Journal of Systems Signal Control and Engineering Application
Control
Systems Engineering
Signal Processing