-
1
-
-
33750825847
-
DOMINO: Detecting MAC layer Greedy behavior in IEEE 802.11 hotspots
-
Raya M, Aad I, Hubaux J-P, and Elfawal A. 2006. DOMINO: Detecting MAC layer Greedy behavior in IEEE 802.11 hotspots. IEEE Transactions on Mobile Computing (TMC), 5(12).
-
(2006)
IEEE Transactions on Mobile Computing (TMC)
, vol.5
, Issue.12
-
-
Raya, M.1
Aad, I.2
Hubaux, J.-P.3
Elfawal, A.4
-
2
-
-
4544324338
-
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots
-
Raya M, Hubaux J-P, and Aad I. 2004. DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In Proc. of MOBISYS'04.
-
(2004)
Proc. of MOBISYS'04
-
-
Raya, M.1
Hubaux, J.-P.2
Aad, I.3
-
3
-
-
1542360013
-
Detection and handling of MAC layer misbehavior in wireless networks
-
Kyasanur P, Vaidya N. Detection and handling of MAC layer misbehavior in wireless networks. 2003. In Dependable Systems and Networks.
-
(2003)
Dependable Systems and Networks
-
-
Kyasanur, P.1
Vaidya, N.2
-
5
-
-
48249157110
-
Detection and prevention of MAC layer misbehavior for ad hoc networks
-
Cárdenas A, Radosavac S, Baras J-S. 2004. Detection and prevention of MAC layer misbehavior for ad hoc networks. In Proc. of SASN.
-
(2004)
Proc. of SASN
-
-
Cárdenas, A.1
Radosavac, S.2
Baras, J.-S.3
-
8
-
-
70449494578
-
-
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 1997. IEEE standards 802.11.
-
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 1997. IEEE standards 802.11.
-
-
-
-
9
-
-
1542268558
-
-
Konorski J. 2001. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperativeWireless LAN Setting. In PROMS, 2213 of LNCS.
-
Konorski J. 2001. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperativeWireless LAN Setting. In PROMS, volume 2213 of LNCS.
-
-
-
-
10
-
-
84948142128
-
-
Konorski J. 2002. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. In NETWORKING, 2345 of LNCS.
-
Konorski J. 2002. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. In NETWORKING, volume 2345 of LNCS.
-
-
-
-
11
-
-
0035508757
-
200. Game Theory and the Design of Self-Configuring. Adaptive Wireless Networks
-
Mackenzie A, Wicker S. 200. Game Theory and the Design of Self-Configuring. Adaptive Wireless Networks. IEEE Communications Magazine, 39(11):126 131.
-
IEEE Communications Magazine
, vol.39
, Issue.11
, pp. 126-131
-
-
Mackenzie, A.1
Wicker, S.2
-
12
-
-
0042474409
-
-
MacKenzie A, Wicker S. 2003. Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information. In Proc. of Infocom 2003, San Francisco, CA, IEEE.
-
MacKenzie A, Wicker S. 2003. Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information. In Proc. of Infocom 2003, San Francisco, CA, IEEE.
-
-
-
-
13
-
-
0036088611
-
-
D. Burroughs D, L. Wilson L, and G. Cybenko G. 2002. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods. In Proc. of IEEE International Performance Computing and Communication Conference.
-
D. Burroughs D, L. Wilson L, and G. Cybenko G. 2002. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods. In Proc. of IEEE International Performance Computing and Communication Conference.
-
-
-
-
14
-
-
84964425047
-
-
Goseva-Popstojanova K, Wang F, Wang R, Gong F, Vaidyanathan K, Trivedi K, and Muthusamy B. 2001. Characterizing Intrusion Tolerant Systems using a State Transition Model. In Proc. of DARPA Information Survivability Conference and Exposition II (DISCEX01).
-
Goseva-Popstojanova K, Wang F, Wang R, Gong F, Vaidyanathan K, Trivedi K, and Muthusamy B. 2001. Characterizing Intrusion Tolerant Systems using a State Transition Model. In Proc. of DARPA Information Survivability Conference and Exposition II (DISCEX01).
-
-
-
-
15
-
-
70449483805
-
-
Sanders W, Cukier M, Webber F, Pal P, and Watro R. 2002. Probabilistic Validation of Intrusion Tolerance. In Digest of Fast Abstracts: The International Conference on Dependable Systems and Networks, Bethesda, Maryland.
-
Sanders W, Cukier M, Webber F, Pal P, and Watro R. 2002. Probabilistic Validation of Intrusion Tolerance. In Digest of Fast Abstracts: The International Conference on Dependable Systems and Networks, Bethesda, Maryland.
-
-
-
-
16
-
-
84878681966
-
Understanding congestion in IEEE 802.1 lb wireless networks
-
Berkeley, CA, USA, pp
-
Jardosh A, Ramachandran K, Almeroth K, and Royer E. 2005. Understanding congestion in IEEE 802.1 lb wireless networks. In Proc. of the 2005 Internet Measurement Conference, (Berkeley, CA, USA), pp. 279-292.
-
(2005)
Proc. of the 2005 Internet Measurement Conference
, pp. 279-292
-
-
Jardosh, A.1
Ramachandran, K.2
Almeroth, K.3
Royer, E.4
-
17
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Gran Canaria, pp
-
Buchegger S, Le Boudec J. 2002. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proc. of Tenth Euromicro PDP, Gran Canaria, pp. 403 410.
-
(2002)
Proc. of Tenth Euromicro PDP
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.2
|