参考文献
[1]易平,蒋嶷川,张世永,等.移动Ad Hoc网络安全综述[J].电子学报,2005,33(5):893-899.
[2]钱钊.基于位置信息的移动自组织网络路由算法研究[D].哈尔滨:哈尔滨工业大学,2013.
[3]Karp B,Kung H T.GPSR:Greedy Perimeter Stateless Routing for Wireless Networks[C]//Proceedings of the 6th International Conference on Mobile Computing and Networking.Boston,USA:ACM Press,2000:243-254.
[4]Zhang Yongguang,Lee W.Intrusion Detection in Wireless Ad-hoc Networks[C]//Proceedings of the 6th International Conference on Mobile Computing and Networking.Boston,USA:ACM Press,2000:275-283.
[5]Zhang Yongguang,Lee W.Intrusion Detection Techniques for Mobile Wireless Networks[J].Mobile Networks and Applications,2003,9(5):545-556.
[6]Kachirski O,Guha R.Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks[C]//Proceedings of IEEE Workshop on Knowledge Media Networking.Kyoto,Japan:IEEE Computer Society,2002:153-158.
[7]姚越鹏,钟求喜.基于代理的分级MANET入侵检测系统[J].计算机工程,2009,35(3):192-194.
[8]Huang Yi-an,Lee W.A Cooperative Intrusion Detection System for Ad Hoc Networks[C]//Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks.New York,USA:ACM Press,2003:135-147.
[9]Cretu G F,Parekh J,Wang Ke,et al.Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks[C]//Proceedings of IEEE Consumer Com-munication and Networking Conference.Las Vegas,USA:IEEE Communications Society,2006:635-639.
[10]Jabbehdari S,Talari S H,Modiri N.A Neural Network Scheme for Anomaly Based Intrusion Detection Systems in Mobile Ad Hoc Networks[J].Journal of Computing,2012,4(2):61-66.
[11]Vgina G,Gawalani S,Srinivasan K,et al.An Intrusion Detection Tool for AODV Based Ad Hoc Wireless Networks[C]//Proceedings of IEEE Annual Computer Security Application Conference.Tucson,USA:IEEE Computer Society,2004:16-27.
[12]Subhadrabandhu D,Sarkar S,Anjum F.A Framework for Misuse Detection in Ad Hoc Networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):274-289.
[13]Nadeem A,Michael P H.A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks[J].IEEE Communications Surveys & Tutorials,2013,15(4):2027-2045.
[14]Tseng C Y,Balasubramanyam P,Ko C,et al.A Specification-based Intrusion Detection System for AODV[C]//Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks.Fairfax,USA:ACM Press,2003:125-134.
[15]Hassan H M,Mahmoud,El-Kassas S.Securing the AODV Protocol Using Specification-based Intrusion Detection[C]//Proceedings of Q2SWinet’06.Torremolinos,Spain:ACM Press,2006:33-36.
[16]Lin Hsiao-ching,Sun Ming-kung,Huang Hanwei,et al.A Specification-based Intrusion Detection Model for Wireless Ad Hoc Networks[C]//Proceedings of the 3rd International Conference on Innovations in Bio-Inspired Computing and Applications.Washington D.C.,USA:IEEE Press,2012:252-257.
[17]易平,柳宁,吴越.基于时间自动机的Ad hoc网络入侵检测[J].电子与信息学报,2009,31(19):2310-2315.
[18]易平.移动Ad Hoc网络入侵检测与主动响应机制研究[D].上海:复旦大学,2005.
[19]王芳,易平,吴越,等.基于规范的移动Ad Hoc网络分布式入侵检测[J].计算机科学,2010,37(10):118-122.
[20]Orset J M,Alcalde B,Cavalli A.An EFSM-based Intrusion Detection System for Ad Hoc Networks[C]//Proceedings of the 3rd International Symposium on Automated Technology for Verification and Analysis.Berlin,Germany:Springer,2005:399-412.
[21]Tseng C H,Song T,Balasubramanyam P,et al.A Specification-based Intrusion Detection Model for OLSR[C]//Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection.Berlin,Germany:Springer,2005:330-350.
编辑顾逸斐 |