-
1
-
-
34547944785
-
-
IEEE802.11 wireless LAN media access control (MAC) and physical layer (PHY) specifications. 1999.
-
IEEE802.11 wireless LAN media access control (MAC) and physical layer (PHY) specifications. 1999.
-
-
-
-
2
-
-
0037003792
-
Denial of service attacks at the mac layer in wireless ad hoc networks
-
October 7-10
-
Gupta V, Krishnamurthy S, Faloutsous M. Denial of service attacks at the mac layer in wireless ad hoc networks. In Proceedings of MILCOM, October 7-10, 2002.
-
(2002)
Proceedings of MILCOM
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsous, M.3
-
3
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
Philadelphia, PA, USA, September, DOI: 10.1145/1023720.1023741;
-
Aad I, Hubaux J-P, Knightly EW. Denial of service resilience in ad hoc networks. In MobiCom'04: Proceedings of the 10th annual international conference on Mobile computing and networking, Philadelphia, PA, USA, September, 2004. DOI: 10.1145/1023720.1023741; 202-215.
-
(2004)
MobiCom'04: Proceedings of the 10th annual international conference on Mobile computing and networking
, pp. 202-215
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
4
-
-
85008044268
-
Selfish MAC layer misbehavior in wire-less networks
-
DOI: 10.1109/TMC.2005.71
-
Kyasanur P, Vaidya N. Selfish MAC layer misbehavior in wire-less networks. IEEE Transactions on Mobile Computing 2005; 4(5): 502-516, DOI: 10.1109/TMC.2005.71.
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.5
, pp. 502-516
-
-
Kyasanur, P.1
Vaidya, N.2
-
5
-
-
4544324338
-
Domino: A system to detect greedy behavior in ieee 802.11 hotspots
-
Boston, MA, USA, June, DOI: 10.1145/990064.990077;
-
Raya M, Hubaux JP, Aad I. Domino: a system to detect greedy behavior in ieee 802.11 hotspots. In MobiSys'04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, Boston, MA, USA, June, 2004. DOI: 10.1145/990064.990077; 84-97.
-
(2004)
MobiSys'04: Proceedings of the 2nd international conference on Mobile systems, applications, and services
, pp. 84-97
-
-
Raya, M.1
Hubaux, J.P.2
Aad, I.3
-
6
-
-
80054071642
-
Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems
-
San José, CA, USA, October
-
Zhou Y, Wu D, Nettles S. Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems. In IEEE/ACM First International Workshop on Broadband Wireless Services and Applications (BroadWISE'04), San José, CA, USA, October, 2004.
-
(2004)
IEEE/ACM First International Workshop on Broadband Wireless Services and Applications (BroadWISE'04)
-
-
Zhou, Y.1
Wu, D.2
Nettles, S.3
-
7
-
-
0016643763
-
Packet switching in radio channels: The hidden terminal problem in carrier sense multiple access models and the busy tone solution
-
Tobagi FA, Kleinrock L. Packet switching in radio channels: the hidden terminal problem in carrier sense multiple access models and the busy tone solution. IEEE Transactions on Communications 1975; 23(12): 1417-1433.
-
(1975)
IEEE Transactions on Communications
, vol.23
, Issue.12
, pp. 1417-1433
-
-
Tobagi, F.A.1
Kleinrock, L.2
-
8
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, Georgia, USA, DOI: 10.1145/570645.570648;
-
Hu YC, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. In MobiCom'02: Proceedings of the 8th annual international conference on Mobile computing and networking, Atlanta, Georgia, USA, 2002. DOI: 10.1145/570645.570648; 12-23.
-
(2002)
MobiCom'02: Proceedings of the 8th annual international conference on Mobile computing and networking
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
San Antonio, Texas, USA, January
-
Papadimitratos P, Haas Z. Secure routing for mobile ad hoc networks. In CNDS'02: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, Texas, USA, January, 2002.
-
(2002)
CNDS'02: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference
-
-
Papadimitratos, P.1
Haas, Z.2
-
10
-
-
33747325673
-
Vulnerabilities of ad hoc network routing protocols to MAC misbehavior
-
Montréal, Québec, Canada, August
-
Guang L, Assi C. Vulnerabilities of ad hoc network routing protocols to MAC misbehavior. In WiMob '05: Proceedings of IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, Montréal, Québec, Canada, August, 2005; 146-153.
-
(2005)
WiMob '05: Proceedings of IEEE International Conference on Wireless And Mobile Computing, Networking And Communications
, pp. 146-153
-
-
Guang, L.1
Assi, C.2
-
11
-
-
31844455819
-
On the resiliency of mobile ad hoc networks to MAC layer misbehavior
-
Montréal, Québec, Canada, October, DOI: 10.1145/1089803.1089981;
-
Guang L, Assi C. On the resiliency of mobile ad hoc networks to MAC layer misbehavior. In PE-WASUN'05: Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, Montréal, Québec, Canada, October, 2005. DOI: 10.1145/1089803.1089981; 160-167.
-
(2005)
PE-WASUN'05: Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
, pp. 160-167
-
-
Guang, L.1
Assi, C.2
-
13
-
-
0032667063
-
Packet switching in radio channels: The effects of on-demand behavior in routing protocols for ad hoc networks
-
Maltz DA, Broch J, Jetcheva J, Johnson DB. Packet switching in radio channels: the effects of on-demand behavior in routing protocols for ad hoc networks. IEEE Journal on Selected Areas in Communications 1999; 17(8): 1439-1453.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1439-1453
-
-
Maltz, D.A.1
Broch, J.2
Jetcheva, J.3
Johnson, D.B.4
-
14
-
-
84858886969
-
Detection and prevention of MAC layer misbehavior for ad hoc networks
-
Washington, DC, USA, October, DOI: 10.1145/1029102.1029107
-
Cárdenas A, Radosavac S, Baras JS. Detection and prevention of MAC layer misbehavior for ad hoc networks. In SASN'04: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington, DC, USA, October 2004. DOI: 10.1145/1029102.1029107.
-
(2004)
SASN'04: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks
-
-
Cárdenas, A.1
Radosavac, S.2
Baras, J.S.3
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, USA, DOI: 10.1145/345910.345955;
-
Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, MA, USA, 2000. DOI: 10.1145/345910.345955; 255-265.
-
(2000)
MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
16
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington, DC, August
-
Bellardo J, Savage S. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In USENIX'03: Proceedings of 12th USENIX Security Symposium., Washington, DC, August, 2003; 15-28.
-
(2003)
USENIX'03: Proceedings of 12th USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
17
-
-
0004194997
-
NS notes and documentation. Technical report, UC Berkley, LBL, USC/ISI
-
Fall K, Varadhan K. NS notes and documentation. Technical report, UC Berkley, LBL, USC/ISI. In Xerox PARC, 2002.
-
(2002)
Xerox PARC
-
-
Fall, K.1
Varadhan, K.2
-
18
-
-
0029694417
-
Modeling, analysis, and simulation of computer and telecommunication systems
-
Febuary, DOI: 10.1109/MASCOT.1996. 501018;
-
Weinmiller J, Woesner H, Wolisz A. Modeling, analysis, and simulation of computer and telecommunication systems. In MASCOTS'96.: Proceedings of the Fourth International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Febuary, 1996. DOI: 10.1109/MASCOT.1996. 501018; 200-206.
-
(1996)
MASCOTS'96.: Proceedings of the Fourth International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems
, pp. 200-206
-
-
Weinmiller, J.1
Woesner, H.2
Wolisz, A.3
|