[1] |
YANG C T , et al. A specification-based intrusion detection system for AODV[A]. Proc of the ACM Workshop on security of Ad Hoc and SensorNetworks[C]. 2003. 125-134.
|
[2] |
HUANG Y , FAN W , LEE W , et al. Cross-featurea nalysisf or detecting ad-hoc routing anomalies[A]. Proceedings of the 23rd Intemational Conference On Distributed Computing Systems[C]. 2003. 478-487.
|
[3] |
SRINIVASARAO G , KUMAR S S . An Efficient Intrusion Detection System in Mobile Ad hoc Networks[A]. Lecture Notes in Electrical Engineering 151[C]. 2013.
|
[4] |
KULKARNI P . Design of hierarchical intrusion detection unit for ad hoc networks based on bayesian networks[M]. Dissertations & These grad works, 2008.
|
[5] |
PERRIG A , ZAPATA , JOHNSON D B . Ariadne:a secure on-demand routing protocol for ad hoc networks[A]. Mobile Computing and Networking ACM[C]. 2002. 12-23.
|
[6] |
JOHN C E . Fast training of support vector machines using sequential minimal optimization[M]. Advances in Kernel Methods Support Vector Learning,Cambridge,MA,M/T Press, 1999: 185-208.
|
[7] |
KEERTHI S S , SHEVADE S K , BHATTACHARYYA C , et al. Improvements to Platt’s SM4 algorithm for SVM classifier design[D]. Dept.of O Mechanical and Production Engineering,National University of Singapore, 1999.
|
[8] |
JOACHIMS T . Making Large-Scale SVM Learning Practical[R]. LS8Report,University of Dortmund, 1998.
|
[9] |
CHANG C C , LIN C J . LIBSVM:a library for support vector machines[EB/OL]. , 2001.
|
[10] |
MILGRAM S . The small world problem[J]. Psychology Today, 1967,(5): 60-67.
|
[11] |
HELMY A . Small worlds in wireless networks[J]. IEEE Communications Letters, 2003,7(10): 490-492.
|
[12] |
CAPKUN S , HUBAUX J P , BUTTYAN L . Mobility helps security in ad hoc networks[A]. Proc of MobiHoc’03,Annapolis[C]. 2003. 45-56.
|
[13] |
PEI W D , CHEN Z Q , YUAN Z Z . Friends-help mechanism for generating a class of scale-free networks[J]. Journal of Jilin University (Information Science Edition) 2007,25(4): 371-378.
|
[14] |
MA C E SHI H S . Security model and mathematical analysis of mobile ad hoc network[J]. Chinese Journal of Sensors and Actuators, 2006,19(4): 1305-1309.
|
[15] |
RAGHAVAN B , SNOEREN A C . Priority forwarding in ad hoc networks with self-interested parties[A]. Workshop on Economics of Peer-to-Peer Systems[C]. Berkeley,USA,May, 2003.
|
[16] |
MIRANDA H , RODRIGUES L . Friends and foes:preventing selfishness in open mobile ad hoc networks[A]. Proc of the First International Workshop on Mobile Distributed Computing (MDC’03)[C]. USA, 2003.
|
[17] |
VAPNIK V N . The nature of statistical learning theory[A]. Series:Information Science and Statistics[C]. 1996.
|
[18] |
RAZAK S A , FURNELL S , CLARKE N , et al. A two-tier intrusion detection system for mobile ad hoc networks–a friend approach[A]. Intelligence and Security Informatics[C]. Springer Berlin Heidelberg, 2006. 590-595.
|
[19] |
DENG H M , ZENG Q A , AGRAWAL D P . SVM-based intrusion detection system for wireless ad hoc networks[A]. Vehicular Technology Conference[C]. 2003.
|
[20] |
WANG X ; WONG J S , STANLEY F , BASU S . Cross-layer based anomaly detection in wireless mesh networks[A]. Ninth Annual International Symposium on Applications and the Internet[C]. 2009. 20-24.
|