We focus on detecting intrusions in wireless ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also generate false positives. Combining theories of hypothesis testing and approximation algorithms, we develop a framework to counter different threats while minimizing the resource consumption. We obtain computationally simple optimal rules for aggregating and thereby minimizing the errors in the decisions of the nodes executing the intrusion detection software (IDS) modules. But, we show that the selection of the optimal set of nodes for executing the IDS is an NP-hard problem. We present a polynomial complexity selection algorithm that attains a guaranteeable app...
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Not like traditional mobile...
Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. By providing commu...
As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especi...
We focus on detecting intrusions in wireless ad hoc networks using the misuse detection technique. W...
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow f...
We focus on detecting intrusions in ad hoc networks using misuse detection techniques and investigat...
We consider ad hoc networks with multiple, mobile intruders. We investigate the placement of the int...
We consider adhoc networks with multiple, mobile colluding intruders. We investigate the placement o...
Mobile Ad hoc Networks (MANET) are self-configuring, infrastructure-less, dynamic wireless networks ...
Mobile Ad hoc Networks (MANET) are self-configuring, infrastructure-less, dynamic wireless networks ...
The self-configuring ability of nodes in MANET absolutes it admired among essential mission applicat...
Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a coo...
A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a...
Abstract --Mobile Ad hoc Networks (MANET)are self-arranging, transportation less, unique remote orga...
Most of the work for securing the routing protocols of mobile ad hoc wireless networks has been done...
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Not like traditional mobile...
Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. By providing commu...
As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especi...
We focus on detecting intrusions in wireless ad hoc networks using the misuse detection technique. W...
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow f...
We focus on detecting intrusions in ad hoc networks using misuse detection techniques and investigat...
We consider ad hoc networks with multiple, mobile intruders. We investigate the placement of the int...
We consider adhoc networks with multiple, mobile colluding intruders. We investigate the placement o...
Mobile Ad hoc Networks (MANET) are self-configuring, infrastructure-less, dynamic wireless networks ...
Mobile Ad hoc Networks (MANET) are self-configuring, infrastructure-less, dynamic wireless networks ...
The self-configuring ability of nodes in MANET absolutes it admired among essential mission applicat...
Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a coo...
A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a...
Abstract --Mobile Ad hoc Networks (MANET)are self-arranging, transportation less, unique remote orga...
Most of the work for securing the routing protocols of mobile ad hoc wireless networks has been done...
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Not like traditional mobile...
Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. By providing commu...
As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especi...