메뉴 건너뛰기




Volumn 51, Issue 9, 2007, Pages 2397-2410

Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework

Author keywords

Attack modeling; Mobile ad hoc networks; QoS; Security; Topology control

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; PROBABILISTIC LOGICS; QUALITY OF SERVICE; SECURITY OF DATA; TOPOLOGY;

EID: 34247478945     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2007.01.028     Document Type: Article
Times cited : (7)

References (13)
  • 1
    • 0038349210 scopus 로고    scopus 로고
    • C.C. Zou, W. Gong, D. Towsley, Code red worm propagation modeling and analysis, in: Proc. of the 9th ACM Conference on Computer and Communications (ACM CCS), Washington, DC, USA, November, 2002, pp. 138-147.
  • 2
    • 0042474227 scopus 로고    scopus 로고
    • Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms, in: Proc. of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. III, April, 2003, pp. 1890-1900.
  • 3
    • 34247517149 scopus 로고    scopus 로고
    • http://www.f-secure.com/v-descs/cabir.shtml.
  • 5
    • 14944368398 scopus 로고    scopus 로고
    • C.C. Zou, W. Gong, D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, in: First ACM Workshop on Rapid Malcode (WORM), Washington, DC, USA, October, 2003.
  • 6
    • 33748372756 scopus 로고    scopus 로고
    • K.R. Rohloff, T. Basar. Stochastic behavior of random constant scanning worms, in: Proc. of the 14th International Conference on Computer Communications and Networks (ICCCN), San Diego, CA, USA, October, 2005, pp. 339-344.
  • 7
    • 0042474229 scopus 로고    scopus 로고
    • M. Garetto, W. Gong, D. Towsley. Modeling malware spreading dynamics, in: Proc. of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. III, March-April, 2003, pp. 1869-1879.
  • 8
    • 25844439630 scopus 로고    scopus 로고
    • A. Ganesh, L. Massoulie, D. Towsley, The effect of network topology on the spread of epidemics, in: Proc. of 24th IEEE Conference on Computer Communications (INFOCOM), vol. II, March, 2005, pp. 1455-1466.
  • 10
    • 34247541504 scopus 로고    scopus 로고
    • C.C. Zou, D. Towsley, W. Gong. Email virus propagation modeling and analysis, Technical Report TR-CSE-03-04, University of Massachusetts, Amherst, MA, USA, 2004.
  • 11
    • 85129566001 scopus 로고    scopus 로고
    • V. Karyotis, S. Papavassiliou, M. Grammatikou, B. Maglaris. On the characterization and evaluation of mobile attack strategies in wireless ad-hoc networks, in: Proc. of the 11th IEEE Symposium on Computers and Communications (ISCC), Pula-Cagliari, Sardinia, Italy, June, 2006.
  • 12
    • 25644450392 scopus 로고    scopus 로고
    • J.-Y. Le Boudec, M. Vojnovic, Perfect simulation and stationarity of a class of mobility models, in: Proc. of 24th IEEE Conference on Computer Communications (INFOCOM), Miami, FL, USA, vol. IV, March, 2005, pp. 2743-2754.
  • 13
    • 3042514350 scopus 로고    scopus 로고
    • F. Zhao, J. Liu, J. Liu, L. Guibas, J. Reich. Collaborative signal and information processing: an information-directed approach, in: Proceedings of the IEEE, vol. 91, No.8, August, 2003 pp. 1199-1208.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.