-
1
-
-
85008543309
-
Provably secure on-demand source routing in mobile ad hoc networks
-
G. Acs, L. Buttyan, and I. Vajda. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 5(11):1533-1546, 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Acs, G.1
Buttyan, L.2
Vajda, I.3
-
2
-
-
33646835755
-
Real-time risk assessment with network sensors and intrusion detection systems
-
Dec
-
A. Årnes, K. Sallhammar, K. Haslum, T. Brekne, M. E. G. Moe, and S. J. Knapskog. Real-time risk assessment with network sensors and intrusion detection systems. In International Conference on Computational Intelligence and Security (CIS), volume LNAI 3802, pages 388-397, Dec 2005.
-
(2005)
International Conference on Computational Intelligence and Security (CIS)
, vol.LNAI 3802
, pp. 388-397
-
-
Årnes, A.1
Sallhammar, K.2
Haslum, K.3
Brekne, T.4
Moe, M.E.G.5
Knapskog, S.J.6
-
3
-
-
48149109112
-
Team: Trust enhanced security architecture for mobile ad-hoc networks
-
Nov
-
V. Balakrishnan, V. Varadharajan, U. Tupakula, and P. Lucs. Team: Trust enhanced security architecture for mobile ad-hoc networks. ICON 2007: 15th IEEE International Conference on Networks, pages 182-187, Nov. 2007.
-
(2007)
ICON 2007: 15th IEEE International Conference on Networks
, pp. 182-187
-
-
Balakrishnan, V.1
Varadharajan, V.2
Tupakula, U.3
Lucs, P.4
-
4
-
-
0242696192
-
Performance analysis of the confidant protocol
-
New York, NY, USA, ACM
-
S. Buchegger and J.-Y. L. Boudec. Performance analysis of the confidant protocol. In MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking&computing, pages 226-236, New York, NY, USA, 2002. ACM.
-
(2002)
MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking&computing
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
5
-
-
0004118144
-
Nuglets: A virtual currency to stimulate cooperation in self-organized ad hoc networks
-
Technical Report DSC/2001/001, Swiss Federal Institute of Technology
-
L. Buttyán and J. Hubaux. Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, 2001.
-
(2001)
-
-
Buttyán, L.1
Hubaux, J.2
-
6
-
-
14844337112
-
Towards Provable Security for Ad Hoc Routing Protocols
-
New York, NY, USA, ACM Press
-
L. Buttyán and I. Vajda. Towards Provable Security for Ad Hoc Routing Protocols. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 94-105, New York, NY, USA, 2004. ACM Press.
-
(2004)
SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 94-105
-
-
Buttyán, L.1
Vajda, I.2
-
7
-
-
84947273682
-
The sybil attack. Peer-to-Peer Systems
-
J. Douceur. The sybil attack. Peer-to-Peer Systems, LNCS 2429:251-260, 2002.
-
(2002)
LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.1
-
9
-
-
84961572484
-
Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Washington, DC, USA, IEEE Computer Society
-
Y.-C. Hu, D. B. Johnson, and A. Perrig. Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. In WMCSA '02: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
WMCSA '02: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
10
-
-
0036957315
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
New York, NY, USA, ACM Press
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In MobiCom '02: Proceedings of the 8th annual international conference on Mobile computing and networking, pages 12-23, New York, NY, USA, 2002. ACM Press.
-
(2002)
MobiCom '02: Proceedings of the 8th annual international conference on Mobile computing and networking
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
11
-
-
0001341422
-
-
Addison-Wesley Longman Publishing Co, Inc, Boston, MA, USA
-
D. B. Johnson, D. A. Maltz, and J. Broch. Ad hoc networking, chapter DSR: the dynamic source routing protocol for multihop wireless ad hoc networks, pages 139-172. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2001.
-
(2001)
Ad hoc networking, chapter DSR: The dynamic source routing protocol for multihop wireless ad hoc networks
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
12
-
-
1542317040
-
Markov-based Modeling of Wireless Local Area Networks
-
ACM
-
S. A. Khayam and H. Radha. Markov-based Modeling of Wireless Local Area Networks. In Proceedings of MSWiM'03. ACM, 2003.
-
(2003)
Proceedings of MSWiM'03
-
-
Khayam, S.A.1
Radha, H.2
-
13
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
B. B. Madan, K. Goseva-Popstojanova, K. Vaidyanathan, and K. S. Trivedi. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 56, 2004.
-
(2004)
Performance Evaluation
, vol.56
-
-
Madan, B.B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
14
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA, ACM
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking, pages 255-265, New York, NY, USA, 2000. ACM.
-
(2000)
MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
15
-
-
5044238739
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In CMS'2002, Communication and Multimedia Security 2002 Conference, September 26-27, 2002, Portoroz, Slovenia, 2002.
-
(2002)
CMS'2002, Communication and Multimedia Security 2002 Conference, September 26-27, 2002, Portoroz, Slovenia
-
-
Michiardi, P.1
Molva, R.2
-
18
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Washington, DC, USA, IEEE Computer Society
-
A. Perrig, J. D. Tygar, D. Song, and R. Canetti. Efficient authentication and signing of multicast streams over lossy channels. In SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Tygar, J.D.2
Song, D.3
Canetti, R.4
-
19
-
-
0000800741
-
A tutorial on hidden markov models and selected applications in speech recognition
-
L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Readings in speech recognition, pages 267-296, 1990.
-
(1990)
Readings in speech recognition
, pp. 267-296
-
-
Rabiner, L.R.1
-
20
-
-
77952621210
-
-
Academic Press, New York, 8th edition
-
S. M. Ross. Introduction to Probability Models, chapter Continuous-Time Markov Chains, pages 349-390. Academic Press, New York, 8th edition, 2003.
-
(2003)
Introduction to Probability Models, chapter Continuous-Time Markov Chains
, pp. 349-390
-
-
Ross, S.M.1
-
22
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
Washington, DC, USA, IEEE Computer Society
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A secure routing protocol for ad hoc networks. In ICNP '02: Proceedings of the 10th IEEE International Conference on Network Protocols, pages 78-89, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
ICNP '02: Proceedings of the 10th IEEE International Conference on Network Protocols
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
23
-
-
0035789243
-
Security-aware ad hoc routing for wireless networks
-
New York, NY, USA, ACM
-
S. Yi, P. Naldurg, and R. Kravets. Security-aware ad hoc routing for wireless networks. In MobiHoc '01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking&computing, pages 299-302, New York, NY, USA, 2001. ACM.
-
(2001)
MobiHoc '01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking&computing
, pp. 299-302
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
24
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
IEEE
-
S. Zhong, J. Chen, and Y. Yang. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In INFOCOM 2003. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, pages 1987-1997. IEEE, 2003.
-
(2003)
INFOCOM 2003. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.3
|