共 9 条
[1]
Ilgun K.(1995)State transition analysis: A rule-based intrusion detection approach IEEE Transactions on Software Engineering 21 181-199
[2]
Kemmerer R.A.(1999)The effects of ondemand behavior in routing protocols for multi-hop wireless ad hoc networks IEEE Journal on Selected Areas in Communications 17 1439-1453
[3]
Porras P.A.(1999)Securing ad hoc networks IEEE Network 13 24-30
[4]
Maltz D.A.(undefined)undefined undefined undefined undefined-undefined
[5]
Broch J.(undefined)undefined undefined undefined undefined-undefined
[6]
Jetcheva J.(undefined)undefined undefined undefined undefined-undefined
[7]
Johnson D.B.(undefined)undefined undefined undefined undefined-undefined
[8]
Zhou L.(undefined)undefined undefined undefined undefined-undefined
[9]
Haas Z.J.(undefined)undefined undefined undefined undefined-undefined