-
4
-
-
28344441933
-
-
M. M. Islam, R. Pose, C. Kopp. A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-Hoc Networks. LNCS, Springer-Verlag, Berlin, Germany, pages 395-4-07, 2003.
-
M. M. Islam, R. Pose, C. Kopp. A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-Hoc Networks. LNCS, Springer-Verlag, Berlin, Germany, pages 395-4-07, 2003.
-
-
-
-
7
-
-
85080394055
-
Making SAHN-MAC Independent of Single Frequency Channel and Omnidirectional Antennas
-
Apr
-
M. M. Islam, R. Pose, C. Kopp. Making SAHN-MAC Independent of Single Frequency Channel and Omnidirectional Antennas. In IASTED NCS, Apr 2005.
-
(2005)
IASTED NCS
-
-
Islam, M.M.1
Pose, R.2
Kopp, C.3
-
8
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Mobile Computing and Networking, pages 275-283, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
9
-
-
0034449688
-
Techniques for Intrusion-Resistant Ad hoc Routing Algorithms (TIARA)
-
Oct
-
R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom and K. Thurber. Techniques for Intrusion-Resistant Ad hoc Routing Algorithms (TIARA). In MILCOM, volume 2. pages 660-664. Oct 2000.
-
(2000)
MILCOM
, vol.2
, pp. 660-664
-
-
Ramanujan, R.1
Ahamad, A.2
Bonney, J.3
Hagelstrom, R.4
Thurber, K.5
-
10
-
-
85177502880
-
-
S. Marti and T. J. Giuli and K. Lai and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000.
-
S. Marti and T. J. Giuli and K. Lai and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000.
-
-
-
-
11
-
-
84954161437
-
Enforcing service availability in mobile ad-hoc WANs
-
Aug
-
L. Buttyán and J. P. Hubaux. Enforcing service availability in mobile ad-hoc WANs. In IEEE/ACM MobiHOC, pages 87-96, Aug 2000.
-
(2000)
IEEE/ACM MobiHOC
, pp. 87-96
-
-
Buttyán, L.1
Hubaux, J.P.2
-
13
-
-
0035178273
-
Security Enhancements in AODV protocol for Wireless Ad Hoc Networks
-
Fall
-
S. Bhargava and D. P. Agrawal. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks. In VTC, volume 4, pages 2143-2147. Fall 2001.
-
(2001)
VTC
, vol.4
, pp. 2143-2147
-
-
Bhargava, S.1
Agrawal, D.P.2
-
16
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection Approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Transactions on Software Engineering, 21(3):181-199, 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
18
-
-
0037885580
-
Towards Routing Security, Fairness and Robustness in Mobile Ad Hoc Networks
-
Jan
-
S. Buchegger, J-Y. L. Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness and Robustness in Mobile Ad Hoc Networks. In Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403-410, Jan 2002.
-
(2002)
Euromicro Workshop on Parallel, Distributed and Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
J-Y2
Boudec, L.3
Bearing Grudges, N.4
-
19
-
-
2442597363
-
Performance Analysis of the CONFIDANT Protocol
-
June
-
S. Buchegger, J-Y. L. Boudec. Performance Analysis of the CONFIDANT Protocol. In ACM MobiHoc. pages 455-465. June 2002.
-
(2002)
ACM MobiHoc
, pp. 455-465
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
20
-
-
85113133621
-
CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks
-
Sep
-
P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In IFIP CMS, Sep 2002.
-
(2002)
IFIP CMS
-
-
Michiardi, P.1
Molva, R.2
-
21
-
-
85080368262
-
TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks
-
Mar
-
K. Balakrishnan, J. Deng, P. K. Varhney. TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. In IEEE WCNC. Mar 2005.
-
(2005)
IEEE WCNC
-
-
Balakrishnan, K.1
Deng, J.2
Varhney, P.K.3
-
22
-
-
13244276488
-
Secure routing in mobile wireless ad hoc networks
-
July
-
Siddhartha Gupte and Mukesh Singhal. Secure routing in mobile wireless ad hoc networks. Elsevier, 1(1):151-174, July 2003.
-
(2003)
Elsevier
, vol.1
, Issue.1
, pp. 151-174
-
-
Gupte, S.1
Singhal, M.2
|