Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
6
Page No.
1106 - 1115
References
Bace, R., 1998. An introduction to intrusion detection and assessment. ICSA., Inc. http://www.iss.net/documents/whitepapers/intrusion.pdf.
Bace, R.G., 2000. Intrusion Detection. Sams Publishing, USA., ISBN: 1578701856, Pages: 339.
Gangwar, S., 2012. Mobile ad hoc network: A comprehensive study and survey on intrusion detection. Int. J. Eng. Res. Appl., 2: 607-612.
Direct Link | Lee, W. and S. Stolfo, 2000. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Secur. J., 3: 227-261.
CrossRef | Direct Link | Mukherjee, B., T.L. Hebedein and K.N. Levitt, 2004. Network intrusion detection. IEEE Network, 8: 26-41.
CrossRef | Direct Link | Perkins, C.E. and E.M. Royer, 1999. Ad-hoc on-demand distance vector routing. Proceedings of the 2nd Workshop on Mobile Computing Systems and Applications, February 25-26, 1999, New Orleans, LA., pp: 90-100.
SANS Institute, 2001. Understanding intrusion detection systems. https://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337.
SANS Institute, 2005. Host- vs. network-based intrusion detection systems. Global Information Assurance Certification Paper. http://www.giac.org/paper/gsec/1377/host-vs-network-based-intrusion-detection-systems/102574.