Related references
Note: Only part of the references are listed.Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks
Bo Sun et al.
IEEE WIRELESS COMMUNICATIONS (2007)
Integration of mobility and intrusion detection for wireless ad hoc networks
Bo Sun et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2007)
Detecting unauthorized and compromised nodes in mobile ad hoc networks
Nikos Komninos et al.
AD HOC NETWORKS (2007)
SCAN: Self-organized network-layer security in mobile ad hoc networks
H Yang et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)
Secure data communication in mobile ad hoc networks
P Papadimitratos et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)
Intrusion detection techniques for mobile wireless networks
YG Zhang et al.
WIRELESS NETWORKS (2003)
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
N Ye et al.
QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL (2001)