MOBICOM   2000 International Conference on Mobile Computing and Networking
Wall of Fame | Most Viewed MOBICOM-2000 Paper
13 years 4 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source190
2Download preprint from source149
3Download preprint from source130
4Download preprint from source128
5Download preprint from source127
6Download preprint from source116
7Download preprint from source115
8Download preprint from source106
9Download preprint from source105
10Download preprint from source100
11Download preprint from source95
12Download preprint from source92
13Download preprint from source90
14Download preprint from source87
15Download preprint from source84
16Download preprint from source76