000 | nam a22 7a 4500 | ||
---|---|---|---|
999 |
_c69600 _d69600 |
||
001 | 239696 | ||
003 | FUTML | ||
005 | 20190508122850.0 | ||
006 | m d | ||
007 | ta | ||
008 | 080519s2014||||nyua gr|||||||1|||eng|d | ||
020 |
_a9781466515673 _c149.93 (NL),124.94 (TX) |
||
035 | _aEBL1386568 | ||
035 | _a(OCoLC)866438987 | ||
035 | _a(AU-PeEL)EBL1386568 | ||
037 | _aB-40945 | ||
040 |
_aAU-PeEL _beng _cAU-PeEL _dAU-PeEL _dFUTML _eAACR2 |
||
050 | 4 |
_aTK5102.85 _b .I57 2014 |
|
082 | 0 | 0 | _a005.8 |
130 |
_aIntrusion Detection in Wireless Ad-Hoc Networks/ _lENG _930835 |
||
245 | 1 | 0 |
_aIntrusion Detection in Wireless Ad-Hoc Networks/ _h(Print resources) _cby Nabendu Chaki and Rituparma Chaki.- |
260 |
_aNew York : _bCRC Press, _cc2014. |
||
300 |
_axiii,244p.: _bill.; _c28 cm |
||
500 | _aDescription based upon print version of record. | ||
504 | _aIncludes index | ||
505 | 0 | _aCONTENTS; Preface; About the Editors; Contributors; CHAPTER 1 Introduction; CHAPTER 2 Architecture and Organization Issues; CHAPTER 3 Routing for Ad-Hoc Networks; CHAPTER 4 Different Types of Attacks for WANs; CHAPTER 5 Honesty and Trust-Based IDS Solutions; CHAPTER 6 Blackhole Attack Detection Technique; CHAPTER 7 Intrusion Detection for Wireless Mesh Networks; CHAPTER 8 Future Trends in WAN Security | |
520 | _aPresenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based | ||
590 | _aB-40945/SABA/080519 | ||
650 | 4 |
_aWireless communication systems -- Security measures. _930836 |
|
655 | 0 |
_aElectronic books. _94 |
|
700 | 1 |
_aChaki, Nabendu _930837 |
|
700 | 1 |
_aChaki, Rituparna. _930838 |
|
776 | 0 | 8 |
_iPrint version: _aChaki, Nabendu _tIntrusion Detection in Wireless Ad-Hoc Networks _dHoboken : Taylor and Francis,c2014 _z9781466515659 |
856 | 4 | 0 |
_uhttp://libdb.njit.edu:8888/login?url=http://NJIT.eblib.com/patron/FullRecord.aspx?p=1386568 _zClick here to view ebook -- Note : Access is limited to current NJIT students, faculty, and staff. |
912 |
_aMOHAMMED SABA ADAMU _bMOHAMMED SABA ADAMU _cMOHAMMED SABA ADAMU |
||
942 |
_2lcc _cBKS |
||
946 | _aEbook for EDS | ||
949 |
_aIBB LIBRARY GIDAN KWANO CAMPUS _cTK5102.85.I57 _d.I57 _nnc 1 |