Sciweavers

RAID
2001
Springer
13 years 9 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
ADHOCNETS
2009
Springer
13 years 9 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador