REFERENCES
1. S. Kurkowski, T. Camp, and M. Colagrosso, MANET simulation studies: the incredibles. ACM SIGMOBILE Mobile Comput. Commun. Rev., ED-9(4): 50–61, 2005.
2. Y. Huang and W. Lee, A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM workshop on Security of Ad Hoc and Sensor Networks, Fairfax, Virginia, USA, 2003.
3. B. Sun, K. Wu, and U. W. Pooch, Alert aggregation in mobile ad hoc networks. In Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, 2003.
4. H. Xie and Z. Hui, An intrusion detection architecture for ad hoc network based on artificial immune system. In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), Taipei, Taiwan, 2006.
5. A. I. Khan, A peer-to-peer associative memory network for intelligent information systems. In Proceedings of The Thirteenth Australasian Conference on Information Systems, Melbourne, Australia, 2002.
6. Z. A. Baig, M. Baqer, and A. I. Khan, A graph neuron-based distributed denial of service (DDoS) attack recognition scheme for wireless sensor networks. In Proceedings of the International Conference of Pattern Recognition (IPCR'06), Hong Kong, 2006.
7. D. P. Agrawal and Q. A. Zeng, Ad hoc and sensor networks. Introduction to Wireless and Mobile Systems, Brooks/Cole-Thomson Learning, pp. 297–348, 2003, chapter 13.
8. R. E. Trajan and A. E. Trojanowski, Finding a maximum independent set. SIAM ...
Get Mobile Intelligence now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.