Back to Results
First PageMeta Content
OSI protocols / Routing / Computing / Optimized Link State Routing Protocol / Link-state routing protocol / Distance-vector routing protocol / Mobile ad hoc network / Wireless networking / Routing algorithms / Network architecture


Risk-Aware Response for Mitigating MANET Routing Attacks Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, US
Add to Reading List

Document Date: 2010-08-02 20:35:26


Open Document

File Size: 251,99 KB

Share Result on Facebook

Company

Ad Hoc Networks / Mobile Ad Hoc Networks / Management Information Systems / RFC Editor United States / IEEE Journal / /

Country

United States / /

/

Event

FDA Phase / /

Facility

Ruoyu Wu Laboratory of Security Engineering / University of California / Arizona State University / /

IndustryTerm

fuzzy cost-sensitive intrusion response solution / reactive routing protocols / combination algorithm / risk-aware response solution / simulation tool / intrusion detection systems / mobile wireless / secure wireless / preventive solutions / response systems / Wireless Communications / computing / proactive routing protocols / Wireless Networks / wireless communication / /

Organization

OLSR MANET / National Science Foundation / Arizona State University / Internal Revenue Service / MANET IDS / Princeton university / University of California / Berkeley / Department of Energy / DRCIF V / DRC / U.S. Securities and Exchange Commission / /

Person

ASE S TUDY / Gail-Joon Ahn / /

Position

evidencedriven message exchange intrusion detection model for manet / Specification-Based Intrusion Detection Model for OLSR / /

Product

Adaptive Decision Making Our / Dempster-Shafer / RFC3626 / /

ProvinceOrState

New Jersey / California / /

PublishedMedium

Journal of Management Information Systems / IEEE Wireless Communications / LECTURE NOTES IN COMPUTER SCIENCE / /

Technology

routing protocol / OLSR MANET protocol / combination algorithm / Secure Network Protocols / routing protocols / Mobile computing / reactive routing protocols / Link State Routing Protocol / proactive routing protocols / simulation / /

SocialTag