Intrusion detection in wireless ad-hoc networks /
edited by Nabendu Chaki and Rituparna Chaki.
- 1 online resource
chapter 1. Introduction / Novarun Deb, Manali Chakraborty, and Nabendu Chaki -- chapter 2. Architecture and organization issues / Manali Chakraborty, Novarun Deb, Debdutta Barman Roy, and Rituparna Chaki -- chapter 3. Routing for ad-hoc networks / Debdutta Barman Roy and Rituparna Chaki -- chapter 4. Different types of attacks for WANs / Debdutta Barman Roy and Rituparna Chaki -- chapter 5. Honesty and trust-based IDS solutions / Novarun Deb, Manali Chakraborty, and Nabendu Chaki -- chapter 6. Blackhole attack detection technique / Debdutta Barman Roy and Rituparna Chaki -- chapter 7. Intrusion detection for wireless mesh networks / Novarun Deb, Manali Chakraborty, and Nabendu Chaki -- chapter 8. Future trends in WAN security / Tapalina Bhattasali, Manali Chakraborty, and Nabendu Chaki.
9780429185588
10.1201/b16394 doi
Wireless communication systems--Security measures.
TK5102.85 / .I57 2014
005.8 / I619
chapter 1. Introduction / Novarun Deb, Manali Chakraborty, and Nabendu Chaki -- chapter 2. Architecture and organization issues / Manali Chakraborty, Novarun Deb, Debdutta Barman Roy, and Rituparna Chaki -- chapter 3. Routing for ad-hoc networks / Debdutta Barman Roy and Rituparna Chaki -- chapter 4. Different types of attacks for WANs / Debdutta Barman Roy and Rituparna Chaki -- chapter 5. Honesty and trust-based IDS solutions / Novarun Deb, Manali Chakraborty, and Nabendu Chaki -- chapter 6. Blackhole attack detection technique / Debdutta Barman Roy and Rituparna Chaki -- chapter 7. Intrusion detection for wireless mesh networks / Novarun Deb, Manali Chakraborty, and Nabendu Chaki -- chapter 8. Future trends in WAN security / Tapalina Bhattasali, Manali Chakraborty, and Nabendu Chaki.
9780429185588
10.1201/b16394 doi
Wireless communication systems--Security measures.
TK5102.85 / .I57 2014
005.8 / I619