A survey of intrusion detection in wireless network applications
- 1 February 2014
- journal article
- review article
- Published by Elsevier BV in Computer Communications
- Vol. 42, 1-23
- https://doi.org/10.1016/j.comcom.2014.01.012
Abstract
No abstract availableKeywords
This publication has 97 references indexed in Scilit:
- Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networksJournal of Network and Computer Applications, 2011
- Elliptical anomalies in wireless sensor networksACM Transactions on Sensor Networks, 2009
- Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networksComputer Communications, 2009
- Reputation-based framework for high integrity sensor networksACM Transactions on Sensor Networks, 2008
- Dynamic quota-based admission control with sub-rating in multimedia serversMultimedia Systems, 2000
- Performance Evaluation of Forwarding Strategies for Location Management in Mobile NetworksThe Computer Journal, 1998
- IDAMN: an intrusion detection architecture for mobile networksIEEE Journal on Selected Areas in Communications, 1997
- Analysis of Replicated Data with Repair DependencyThe Computer Journal, 1996
- On the reliability of AI planning software in real-time applicationsIEEE Transactions on Knowledge and Data Engineering, 1995
- Effect of artificial-intelligence planning-procedures on system reliabilityIEEE Transactions on Reliability, 1991