AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Free intrusion detection software for mac12/29/2022 ![]() ![]() Shafiullah, “Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks,” The International Arab Journal of Information Technology, Vol. Madhavi, “An Intrusion Detection System in Mobile Adhoc Networks,” International Journal of Security and Its Applications, Vol. Rakesh, “A Novel Cross Layer Intrusion Detection System in MANET,” Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, pp. ![]() ![]() “Wireless Intrusion Detection and Response.” Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, 18-20 June 2003, pp. Hall, “Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting,” IEEE Transactions on Dependable and Secure Computing, Vol. Sridhar, “A Cross-Layer Based Intrusion Detection Approach for Wireless Ad Hoc Networks,” Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005, p. Denning, “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, Vol. Wespi, “Towards a Taxonomy of Intrusion-Detection Systems,” Computer Networks, Vol. Dasgupta, et al., “Cougar Based Intrusion Detection System (Cids),” Cs Technical Report No. Levitt, “Network Intrusion Detection,” IEEE Network, Vol. ![]()
0 Comments
Read More
Leave a Reply. |