-
1
-
-
0037003792
-
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
-
V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks," in Proc. of IEEE MILCOM '02, 2002, pp. 1118-1123.
-
(2002)
Proc. of IEEE MILCOM '02
, pp. 1118-1123
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
3
-
-
35148826261
-
Cross-Layer Attacks in Wireless Ad Hoc Networks
-
Princeton University
-
S. Radosavac, N. Benammar, and J. S. Baras, "Cross-Layer Attacks in Wireless Ad Hoc Networks," in Information Sciences and Systems. Princeton University, 2004, pp. 1266-1271.
-
(2004)
Information Sciences and Systems
, pp. 1266-1271
-
-
Radosavac, S.1
Benammar, N.2
Baras, J.S.3
-
4
-
-
0041973497
-
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
-
March
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," in Proc. of IEEE INFOCOM '03., March 2003.
-
(2003)
Proc. of IEEE INFOCOM '03
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
11244252132
-
Denial of Service Resilience in Ad Hoc Networks
-
I. Aad, J.-P. Hubaux, and E. W. Knightly, "Denial of Service Resilience in Ad Hoc Networks," in Proc. of ACM MobiCom '04, 2004, pp. 202-215.
-
(2004)
Proc. of ACM MobiCom '04
, pp. 202-215
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
7
-
-
33847372101
-
Increasing the DoS Attack Resiliency in Military Ad Hoc Networks
-
J. V. E. Molsa, "Increasing the DoS Attack Resiliency in Military Ad Hoc Networks," in Proc. of IEEE MILCOM '05, 2005, pp. 1-7.
-
(2005)
Proc. of IEEE MILCOM '05
, pp. 1-7
-
-
Molsa, J.V.E.1
-
8
-
-
33846606856
-
Defending Against Packet Injection in Unreliable Ad Hoc Networks
-
Q. Gu, P. Liu, S. Zhu, and C.-H. Chu, "Defending Against Packet Injection in Unreliable Ad Hoc Networks," in Proc. of IEEE GLOBECOM '05, 2005.
-
(2005)
Proc. of IEEE GLOBECOM '05
-
-
Gu, Q.1
Liu, P.2
Zhu, S.3
Chu, C.-H.4
-
9
-
-
24944490509
-
Mitigating Malicious Control Packet Floods in Ad Hoc Networks
-
S. Desilva and R. V. Boppana, "Mitigating Malicious Control Packet Floods in Ad Hoc Networks," in Proc. of IEEE WCNC '05, 2005, pp. 2112-2117.
-
(2005)
Proc. of IEEE WCNC '05
, pp. 2112-2117
-
-
Desilva, S.1
Boppana, R.V.2
-
10
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad hoc Networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad hoc Networks," in Proc. of ACM MobiCom '00, 2000, pp. 255-265.
-
(2000)
Proc. of ACM MobiCom '00
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
11
-
-
29844454971
-
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities
-
J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, and M. Gerla, "A Secure Ad-hoc Routing Approach using Localized Self-healing Communities," in. Proc. of ACM MobiHoc '05., 2005.
-
(2005)
Proc. of ACM MobiHoc '05
-
-
Kong, J.1
Hong, X.2
Yi, Y.3
Park, J.-S.4
Liu, J.5
Gerla, M.6
-
12
-
-
0036957315
-
Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks
-
Atlanta, USA, Sept
-
Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks," in Proc. of MobiCom '02, Atlanta, USA, Sept. 2002.
-
(2002)
Proc. of MobiCom '02
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
13
-
-
0036793924
-
Denial of Service in Sensor Networks
-
Oct
-
A. D. Wood and J. A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer Magazine, vol. 35, no. 10, pp. 54-62, Oct 2002.
-
(2002)
IEEE Computer Magazine
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
14
-
-
0037086880
-
Revealing the Problems with 802.11 Medium Access Control Protocol in Multi-hop Wireless Ad Hoc Networks
-
S. Xu and T. Saadawi, "Revealing the Problems with 802.11 Medium Access Control Protocol in Multi-hop Wireless Ad Hoc Networks," Elsevier Journal of Computer Networks, vol. 38, no. 4, pp. 531-548, 2002.
-
(2002)
Elsevier Journal of Computer Networks
, vol.38
, Issue.4
, pp. 531-548
-
-
Xu, S.1
Saadawi, T.2
-
16
-
-
36348935385
-
Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes
-
F. Xing and W. Wang, "Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes," in Proc. of IEEE ICC '06., 2006.
-
(2006)
Proc. of IEEE ICC '06
-
-
Xing, F.1
Wang, W.2
-
18
-
-
0141762461
-
Code-Red: A Case Study on the Spread and Victims of an Internet Worm
-
D. Moore, C. Shannon, and J. Brown, "Code-Red: A Case Study on the Spread and Victims of an Internet Worm," in IMW '02: Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurment, 2002, pp. 273-284.
-
(2002)
IMW '02: Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurment
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
19
-
-
16244368460
-
Model-Based Validation of an Intrusion-Tolerant Information System
-
Oct
-
F. Stevens, T. Courtney, S. Singh, A. Agbaria, J. F. Meyer, W. H. Sanders, and P. Pal, "Model-Based Validation of an Intrusion-Tolerant Information System," in Proc. of 23rd IEEE International Symposium on Reliable Distributed Systems (SRDS'04), Oct. 2004, pp. 184-194.
-
(2004)
Proc. of 23rd IEEE International Symposium on Reliable Distributed Systems (SRDS'04)
, pp. 184-194
-
-
Stevens, F.1
Courtney, T.2
Singh, S.3
Agbaria, A.4
Meyer, J.F.5
Sanders, W.H.6
Pal, P.7
|