메뉴 건너뛰기




Volumn 1, Issue 3-4, 2006, Pages 255-265

A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks

Author keywords

attack modelling and propagation; security; vulnerability analysis; wireless ad hoc networks

Indexed keywords


EID: 44649095872     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.011785     Document Type: Article
Times cited : (24)

References (21)
  • 2
    • 84952959601 scopus 로고    scopus 로고
    • F-secure website (2004) Available at: http://www.f-secure.com/v-descs/cabir.shtml.
    • (2004)
    • F-secure website1
  • 9
    • 0037297684 scopus 로고    scopus 로고
    • Sexual networks: implications for the transmission of sexually transmitted infections
    • Liljeros, F., Edling, C.R. and Amaral, L.A.N. (2003) ‘Sexual networks: implications for the transmission of sexually transmitted infections’, Microbes and Infection, June, pp.189–196.
    • (2003) Microbes and Infection , vol.June , pp. 189-196
    • Liljeros, F.1    Edling, C.R.2    Amaral, L.A.N.3
  • 11
    • 0345851235 scopus 로고    scopus 로고
    • Wireless integrated network sensors
    • Pottie, G.J. and Kaiser, W.J. (2000) ‘Wireless integrated network sensors’, Communications of the ACM, Vol. 43, No. 5, pp.51–58.
    • (2000) Communications of the ACM , vol.43 , Issue.5 , pp. 51-58
    • Pottie, G.J.1    Kaiser, W.J.2
  • 14
    • 80053647353 scopus 로고    scopus 로고
    • VACCINE: war of the worms in wired and wireless networks
    • University of Southern California, Los Angeles, USA, July
    • Tanachaiwiwat, S. and Helmy, A. (2005) ‘VACCINE: war of the worms in wired and wireless networks’, Technical Report, University of Southern California, Los Angeles, USA, July.
    • (2005) Technical Report
    • Tanachaiwiwat, S.1    Helmy, A.2
  • 18
    • 14944368398 scopus 로고    scopus 로고
    • Worm propagation modeling and analysis under dynamic quarantine defense
    • Washington, DC
    • Zou, C.C., Gong, W. and Towsley, D. (2003) ‘Worm propagation modeling and analysis under dynamic quarantine defense’, First ACM Workshop on Rapid Malcode (WORM), Washington, DC.
    • (2003) First ACM Workshop on Rapid Malcode (WORM)
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 19
    • 14944350556 scopus 로고    scopus 로고
    • Email virus propagation modeling and analysis
    • University of Massachusetts, Amherst, MA
    • Zou, C.C., Towsley, D. and Gong, W. (2004) ‘Email virus propagation modeling and analysis’, Technical Report TR-CSE-03-04, University of Massachusetts, Amherst, MA.
    • (2004) Technical Report TR-CSE-03-04
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 20
    • 84952963988 scopus 로고    scopus 로고
    • In addition, this justifies the fact that a malicious node usually has a higher probability to infect other network nodes compared to the infection capability of already infected network nodes
    • In addition, this justifies the fact that a malicious node usually has a higher probability to infect other network nodes compared to the infection capability of already infected network nodes.
  • 21
    • 84952960224 scopus 로고    scopus 로고
    • Since the deployment region is fixed, the node density is proportional to the number of network nodes
    • Since the deployment region is fixed, the node density is proportional to the number of network nodes.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.