4.5 Article

A Novel Intrusion Detection System Based on Trust Evaluation to Defend Against DDoS Attack in MANET

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks

M. Poongodi et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2014)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Engineering, Electrical & Electronic

Efficient Computer Network Anomaly Detection by Changepoint Detection Methods

Alexander G. Tartakovsky et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2013)

Article Computer Science, Hardware & Architecture

NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Chun-Jen Chung et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2013)

Article Computer Science, Theory & Methods

LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks

Xiaoyong Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Information Systems

Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance

Jonny Milliken et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2013)

Article Computer Science, Hardware & Architecture

FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks

Jerome Francois et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2012)

Article Computer Science, Information Systems

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

Fenye Bao et al.

IEEE Transactions on Network and Service Management (2012)

Article Computer Science, Information Systems

Hybrid trust and reputation management for sensor networks

Efthimia Aivaloglou et al.

WIRELESS NETWORKS (2010)

Article Computer Science, Hardware & Architecture

On scalable attack detection in the network

Ramana Rao Kompella et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2007)

Article Engineering, Electrical & Electronic

Intrusion detection routers: Design, implementation. and evaluation using an experimental testbed

Eric Y. K. Chan et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)

Article Engineering, Electrical & Electronic

A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods

Alexander G. Tartakovsky et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2006)

Article Computer Science, Hardware & Architecture

Detecting and isolating malicious routers

Alper Tugay Mizrak et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2006)

Article Computer Science, Hardware & Architecture

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris et al.

COMPUTER NETWORKS (2004)

Article Computer Science, Information Systems

A taxonomy of DDoS attack and DDoS Defense mechanisms

J Mirkovic et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2004)

Article Engineering, Electrical & Electronic

Network intrusion and fault detection: A statistical anomaly approach

C Manikopoulos et al.

IEEE COMMUNICATIONS MAGAZINE (2002)