The following publications are possibly variants of this publication:
- A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc NetworksJie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang. icc 2008: 1515-1519 [doi]
- Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc NetworksShengrong Bu, F. Richard Yu, Xiaoping P. Liu, Helen Tang. TWC, 10(9):3064-3073, 2011. [doi]
- Optimal Biometric-Based Continuous Authentication in Mobile Ad Hoc NetworksJie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang. wimob 2007: 76 [doi]
- Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc NetworksShengrong Bu, F. Richard Yu, Peter X. Liu, Peter C. Mason, Helen Tang. tvt, 60(3):1025-1036, 2011. [doi]