

Generic Framework for IP Based Mobility Analysis and Hostname Tracking based Intrusion Detection
Abstract
Keywords
References
Min Sheng, Jiandong Li and Yan Shi, “Critical Nodes Detection in Mobile Ad-hoc Network”, proceedings of the 20th International
Conference on Advanced Information Networking and Applications (AINA‟06), IEEE Tranactions, 2006.
Michaël Hauspie, “Localized Algorithms for Detection of Critical Nodes and Links for Connectivity in Ad hoc Networks”, proceeding in 3rd IFIP Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET 2004), Bodrum, Turkey”, 2004.
Andrew R. Cormier, Carl B. Dietrich, Jeremy Price, Jeffrey H. Reed, “Dynamic reconfiguration of software defined radios using standard architectures”, Physical Communication 3, pp. 73-80, 2010.
Anh Thien Tran, Dean Nguyen Truong and Bevan Baas, “A Reconfigurable Source-Synchronous On-Chip Network for GALS Many-Core Platforms”, IEEE Transactions on Computer-Aided Design Of Integrated Circuits and Systems, Vol. 29, No. 6, June 2010.
E. Beigne, F. Clermidy, H. Lhermet, S. Miermont, Y. Thonnart, X.-T. Tran, A. Valentian, D. Varreau, P. Vivet, X. Popon, and H. Lebreton, “An asynchronous power aware and adaptive NoC based circuit”, IEEE J. Solid-State Circuits, vol. 44, no. 4, pp. 1167–1177, Apr. 2009.
P. Teehan, G. G. F. Lemieux and M. R. Greenstreet, “Estimating reliability and throughput of source-synchronous wave-pipelined interconnect”, in Proc. ACM/IEEE International Symposium Network Chip (NOCS), pp. 234–243, May 2009.
X. Xiang, X. Wang and Y. Yang, “Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks”, IEEE Transactions On Mobile Computing, Vol. 10, No. 5, April 2011.
J. H. Sarker, M. Hassan, S. Halme, “Power level selection schemes to improve throughput and stability of slotted ALOHA under heavy load”, Computer Communication 25, 2002.
Luca Benini, Giovanni De Micheli, “Networks on Chips: A New SoC Paradigm”, in IEEE Transactions, 2002.
Shaomeng Li, “Exploiting Reconfigurable Hardware for Network Security”, in proceeding of 11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines(FCCM'03), 2003.
Wagner, D. and Soto, P., “Intrusion detection: Mimicry attacks on host-based intrusion detection systems”, in proceedings of the 9th ACM conference on Computer and Communications Security, November, 2002.
Zanero, S., Savaresi, S.M., “Unsupervised learning techniques for an intrusion detection system.” in proceedings of the ACM Symposium on Applied Computing, March, 2004.
Min Sheng, Jiandong Li and Yan Shi, “Critical Nodes Detection in Mobile Ad Hoc Network”, proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA‟06), 2006.
Olatunji Ruwase, Phillip B. Gibbons, Todd C. Mowry, Vijaya Ramachandran, Shimin Chen, Michael Kozuch, Michael Ryan, “Parallelizing Dynamic Information Flow Tracking”, SPAA‟08, Munich, Germany, June 14–16, 2008.
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas Devadas, “Secure Program Execution via Dynamic Information Flow Tracking”, ASPLOS‟04, Boston, Massachusetts, USA, October 7–13, 2004.
Yoshifumi Sakamoto, Kouichi Ono, Takeo Nakada, Yousuke Kubo and Hiroto Yasuura, “System-Level Energy Estimation for SoC based on the Dynamic Behavior of Embedded Software”, World Academy of Science, Engineering and Technology 59, 2011.
S. Gajek, A.-R. Sadeghi, C. Stueble and M. Winandy, “Compartmented security for browsers – or how to thwart a phisher with trusted computing”, in proceedings of the 2nd International Conference on Availability, Reliability and Security, Vienna, Austria, April 2007.
M. Gokhale, “Granidt: Towards Gigabit Rate Network Intrusion Detection Technology”, in Proceeding of 12th International Conference, FPL2002, France, Los Alamos National Laboratory, 2002.
M. Anand, Dr. S. Ravi, Kuldeep Chouhan, Syed Musthak Ahmed, “Context Switching Semaphore with Data Security Issues using Self-healing Approach”, International Journal of Advanced Computer Science and Applications, Vol. 2, No. 6, 2011.
J. Newsome and D. Song, “Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software”, in proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS), February 2005.
Jeongmin Park, Joonhoon Lee, Hyunsang Youn, and Eunseok Lee, “Approach To Determining An External Problem For Self-Healing”, in Special Issue on Ubiquitous Computing Security Systems, Vol. 4, pp. 670-676, 2007.
T.A. Ramesh Kumaar and Dr. I.A.Chidambaram, “Self-Healing Strategy for Dynamic Security Assessment and Power System Restoration”,International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004), Vol. 2, Issue 2, April 2011.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.