메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 1516-1521

An Adaptive Security Model for Mobile Agents in Wireless Networks

Author keywords

Adaptive Security; DoS attack; Fuzzy control; Mobile Agents; Wireless Ad hoc Network

Indexed keywords

ALGORITHMS; CODES (STANDARDS); COMPUTER SIMULATION; ENERGY UTILIZATION; FUZZY CONTROL; MATHEMATICAL MODELS; RADIO; SECURITY OF DATA; TELEPHONE SETS;

EID: 0842332401     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (19)

References (17)
  • 2
    • 0003906677 scopus 로고
    • Mobile Agents: Are they a good idea?
    • IBM Research Report, IBM Research Division, NY, March
    • C.G. Harrison, D.M. Chess, and A.Kershenbaum, "Mobile Agents: Are they a good idea?" Technical report, IBM Research Report, IBM Research Division, NY, March 1995
    • (1995) Technical Report
    • Harrison, C.G.1    Chess, D.M.2    Kershenbaum, A.3
  • 4
    • 78349285372 scopus 로고    scopus 로고
    • GloMoSim at http://pcl.cs.ucla.edu/projects/glomosim/.
    • GloMoSim
  • 7
    • 85163777605 scopus 로고    scopus 로고
    • Quantifying Vulnerabilities in the Networked Environment: Methods and Uses
    • Symantec
    • Char Sample, Symantec and Ian Poynter, "Quantifying Vulnerabilities in the Networked Environment: Methods and Uses", Jerboa Inc White Paper, 2000.
    • (2000) Jerboa Inc White Paper
    • Sample, C.1    Poynter, I.2
  • 10
    • 85014167243 scopus 로고    scopus 로고
    • Seven good reasons for mobile agents
    • D.B.Lange and M.Oshima, "Seven good reasons for mobile agents", Communications of ACM, 42(3):88-89, 1999.
    • (1999) Communications of ACM , vol.42 , Issue.3 , pp. 88-89
    • Lange, D.B.1    Oshima, M.2
  • 11
    • 0002586020 scopus 로고    scopus 로고
    • Mobile Agent Applications
    • July-September
    • D.Milojick "Mobile Agent Applications", IEEE concurrency, pages 80-90, July-September 1999.
    • (1999) IEEE Concurrency , pp. 80-90
    • Milojick, D.1
  • 13
    • 84879871458 scopus 로고    scopus 로고
    • Routing Security in Ad Hoc Networks
    • Seminar on Network Security
    • J Lundberg "Routing Security in Ad Hoc Networks", Proceedings of HUTTML 2000, Seminar on Network Security
    • (2000) Proceedings of HUTTML 2000
    • Lundberg, J.1
  • 14
    • 0033882156 scopus 로고    scopus 로고
    • MANGET:AdHoc Network System Based on Mobile Agents
    • Apr
    • N.Kawaguchi, K.Toyama, Y.Inagaki, "MANGET:AdHoc Network System Based on Mobile Agents", Computer Communication., Vol 23, No 8, pp 761-768, Apr 2000.
    • (2000) Computer Communication , vol.23 , Issue.8 , pp. 761-768
    • Kawaguchi, N.1    Toyama, K.2    Inagaki, Y.3
  • 16
    • 10644269064 scopus 로고    scopus 로고
    • Prevention of Denial of Service Attacks and selfishness in Mobile Ad Hoc Networks
    • January
    • P Michiardi, R Molva "Prevention of Denial of Service Attacks and selfishness in Mobile Ad Hoc Networks", Research Report RR-02-063 - January 2002.
    • (2002) Research Report , vol.RR-02-063
    • Michiardi, P.1    Molva, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.