[1]
|
B. Mukherjee, L. T. Heberlein and K. N. Levitt, “Network Intrusion Detection,” IEEE Network, Vol. 8, No. 3, 1994, pp. 8-10.doi:10.1109/65.283931
|
[2]
|
D. Dasgupta, et al., “Cougar Based Intrusion Detection System (Cids),” Cs Technical Report No. Cs-02-001, 4 February 2002.
|
[3]
|
H. Debar, M. Dacier and A. Wespi, “Towards a Taxonomy of Intrusion-Detection Systems,” Computer Networks, Vol. 31, No. 8, 1999, pp. 805-822.
doi:10.1016/S1389-1286(98)00017-6
|
[4]
|
D. Denning, “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, Vol. Se-13, No. 2, 1987, pp. 222-232.
|
[5]
|
G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar, “A Cross-Layer Based Intrusion Detection Approach for Wireless Ad Hoc Networks,” Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005, p. 861.
doi:10.1109/MAHSS.2005.1542882
|
[6]
|
J. Hall, “Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting,” IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 3, 2005, pp. 18-22.
|
[7]
|
Y. Lim, T. Schmoyer, J. Levine and H. L. Owen. “Wireless Intrusion Detection and Response.” Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, 18-20 June 2003, pp. 22-26.
|
[8]
|
S. Rakesh, “A Novel Cross Layer Intrusion Detection System in MANET,” Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, pp. 38-48.
|
[9]
|
S. Madhavi, “An Intrusion Detection System in Mobile Adhoc Networks,” International Journal of Security and Its Applications, Vol. 2, No. 3, 2008, pp 11-17.
|
[10]
|
K. Shafiullah, “Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks,” The International Arab Journal of Information Technology, Vol. 7, No. 4, 2010, pp. 50-55.
|
[11]
|
Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Network,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, 6-11 August 2000, pp. 26-31.
doi:10.1145/345910.345958
|
[12]
|
W. Xia, J. S. Wong, F. Stanley and S. Basu, “Cross-Layer Based Anomaly Detection in Wireless Mesh Networks,” 9th Annual International Symposium on Applications and the Internet, Bellevue, 20-24 July 2009, pp. 9-15.
|
[13]
|
J. S. Bal, et al., “A Cross Layer Based Intrusion Detection Technique for Wireless Network,” International Journal of Computer Science and Information Security, Vol. 5, September 2009, Article ID: 25080924.
|
[14]
|
R. Kaur, “Study of Intrusion Detection Systems for Wireless Networks,” International Journal of Wireless Networks and Communication, Vol. 13, 2011,In Press.
|
[15]
|
R. Kaur, “Cross Layer Based Intrusion Detection System for Wireless Domain-Acritical Analysis,” International Journal of Computer Science and Communication, Vol. 2, No. 2 (Accepted for publication), 2011.
|