Search Results - "Subhadrabandhu, D."

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    A framework for misuse detection in ad hoc Networks-part I by Subhadrabandhu, D., Sarkar, S., Anjum, F.

    “…We consider ad hoc networks with multiple, mobile intruders. We investigate the placement of the intrusion detection modules for misuse-based detection…”
    Get full text
    Journal Article
  2. 2

    A framework for misuse detection in ad hoc networks- part II by Subhadrabandhu, D., Sarkar, S., Anjum, F.

    “…We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due…”
    Get full text
    Journal Article
  3. 3

    Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols by Anjum, F., Subhadrabandhu, D., Sarkar, S.

    “…In this paper we focus on intrusion detection in wireless networks. The intrusion detection community has been concentrating mainly on wired networks…”
    Get full text
    Conference Proceeding
  4. 4

    On optimal placement of intrusion detection modules in sensor networks by Anjum, F., Subhadrabandhu, D., Sarkar, S., Shetty, R.

    “…Sensor networks have increasingly become the subject of intense scientific interest over the past few years. In this work, we focus on intrusion detection in…”
    Get full text
    Conference Proceeding
  5. 5
  6. 6

    Efficacy of misuse detection in ad hoc networks by Subhadrabandhu, D., Sarkar, S., Anjum, F.

    “…We consider ad hoc networks with multiple, mobile colluding intruders. We investigate the placement of the intrusion detection modules for misuse intrusion…”
    Get full text
    Conference Proceeding