-
2
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
ACM
-
Zhang Y., Lee W., and Huang Y. Intrusion detection techniques for mobile wireless networks. ACM Wireless Networks (2003), ACM 545-556
-
(2003)
ACM Wireless Networks
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
3
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
Hu Y., and Perrig A. A survey of secure wireless ad hoc routing. IEEE Security and Privacy (2004) 28-39
-
(2004)
IEEE Security and Privacy
, pp. 28-39
-
-
Hu, Y.1
Perrig, A.2
-
5
-
-
0034546898
-
Intrusion detection in wireless ad hoc networks
-
ACM
-
Zhang Y., and Lee W. Intrusion detection in wireless ad hoc networks. Proceedings of the MOBICOM 2000 (2000), ACM 275-283
-
(2000)
Proceedings of the MOBICOM 2000
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
6
-
-
2442479712
-
ipass: an incentive compatible auction scheme to enable packet forwarding service in manet
-
IEEE
-
Chen K., and Nahrstedt K. ipass: an incentive compatible auction scheme to enable packet forwarding service in manet. Proceedings of the 24th ICDCS'04 (2004), IEEE
-
(2004)
Proceedings of the 24th ICDCS'04
-
-
Chen, K.1
Nahrstedt, K.2
-
8
-
-
12244292723
-
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks
-
Michiardi P., and Molva R. Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. Elsevier Journal: Ad hoc Networks 3 (2005) 193-219
-
(2005)
Elsevier Journal: Ad hoc Networks
, vol.3
, pp. 193-219
-
-
Michiardi, P.1
Molva, R.2
-
13
-
-
10444240238
-
Specification faithfulness in networks with rational nodes
-
ACM
-
Shneidman J., and Parkes D. Specification faithfulness in networks with rational nodes. Proceedings of the PODC'04 (2004), ACM
-
(2004)
Proceedings of the PODC'04
-
-
Shneidman, J.1
Parkes, D.2
-
14
-
-
1542299118
-
Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents
-
ACM, San Diego, California
-
Anderegg L., and Eidenbenz S. Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. Proceedings of the MobiCom'03 (2003), ACM, San Diego, California 245-259
-
(2003)
Proceedings of the MobiCom'03
, pp. 245-259
-
-
Anderegg, L.1
Eidenbenz, S.2
-
16
-
-
50949085025
-
A game theoretic approach to detect network intrusions: The cooperative intruders scenario
-
IEEE
-
Mehrandish M., Otrok H., Debbabi M., Assi C., and Bhattacharya P. A game theoretic approach to detect network intrusions: The cooperative intruders scenario. Proceedings of the 49th annual of IEEE GLOBECOM (2006), IEEE
-
(2006)
Proceedings of the 49th annual of IEEE GLOBECOM
-
-
Mehrandish, M.1
Otrok, H.2
Debbabi, M.3
Assi, C.4
Bhattacharya, P.5
-
18
-
-
60649107168
-
A bayesian game approach for intrusion detection in wireless ad hoc networks
-
ACM
-
Liu Y., Comaniciu C., and Man H. A bayesian game approach for intrusion detection in wireless ad hoc networks. Proceedings of the GameNets06 (2006), ACM
-
(2006)
Proceedings of the GameNets06
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
|