-
1
-
-
34548587732
-
-
N. Nandiraju, D. Nandiraju, L. Santhanam, B. He, 1. Wang, and D. P. Agrawal, Wireless mesh networks: current challenges and future directions of web-in-the-sky, in IEEE Communication, Aug.2007, l4, no.4 , pp. 2-12 .
-
N. Nandiraju, D. Nandiraju, L. Santhanam, B. He, 1. Wang, and D. P. Agrawal, "Wireless mesh networks: current challenges and future directions of web-in-the-sky," in IEEE Communication, Aug.2007, vol.l4, no.4 , pp. 2-12 .
-
-
-
-
6
-
-
24144437206
-
How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols
-
P. Ning and K. Sun, "How to misuse AODV: a case study of insider attacks against mobile ad hoc routing protocols," Ad Hoc Networks, vol. 3, no.6, pp. 795-819,2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.6
, pp. 795-819
-
-
Ning, P.1
Sun, K.2
-
9
-
-
11244269535
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
Y. Hu , D. B. John son, and A. Perrig , "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, 2003, pp.175-192.
-
(2003)
Ad Hoc Networks
, pp. 175-192
-
-
Hu, Y.1
John son, D.B.2
Perrig, A.3
-
10
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," In Proc. of ACM Mobicom, pp. 12-23, 2002 .
-
(2002)
Proc. of ACM Mobicom
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
11
-
-
74249105048
-
-
The Honeynet Project
-
The Honeynet Project, (http://www.honeynet.org/)
-
-
-
-
12
-
-
33746954566
-
Honeypot back-propagation for mitigating spoofing distributed Denial-of-service attacks
-
April
-
S. Khattab, R. Melhem, D. Mosse, and T. Znati , "Honeypot back-propagation for mitigating spoofing distributed Denial-of-service attacks," Journal of Parallel and Distributed Comp., vol. 66, pp. 11521164, April 2006.
-
(2006)
Journal of Parallel and Distributed Comp
, vol.66
, pp. 11521164
-
-
Khattab, S.1
Melhem, R.2
Mosse, D.3
Znati, T.4
-
13
-
-
1642516070
-
The Hone ynet Project: Trapping the Hackers
-
March
-
L. Spintzer, "The Hone ynet Project: Trapping the Hackers," IEEE Security and Privacy Magazine, vol . 1, no. 2, March 2003.
-
(2003)
IEEE Security and Privacy Magazine
, vol.1
, Issue.2
-
-
Spintzer, L.1
-
17
-
-
77953095994
-
-
M. A. -Shurman, S. -M. Yoo, and S. Park, Blackhole Attack in Mobile ad Hoc Networks, In Proceedings of ACM of 42nd annual South-East Confe rence Regional Conference, pp. 96-97,2004 .
-
M. A. -Shurman, S. -M. Yoo, and S. Park, " Blackhole Attack in Mobile ad Hoc Networks," In Proceedings of ACM of 42nd annual South-East Confe rence Regional Conference, pp. 96-97,2004 .
-
-
-
-
18
-
-
0036804761
-
Routing Security in Wireless Ad Hoc Net work
-
October
-
H. Deng, W. Li, and D. P. Agrawal, "Routing Security in Wireless Ad Hoc Net work," IEEE Communications Magazine, vol. 40, no. 10. October 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
19
-
-
1642307979
-
Prevention of Cooperative Black Hole attack in Wireless Ad Hoc Net works
-
June
-
S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard , " Prevention of Cooperative Black Hole attack in Wireless Ad Hoc Net works," Proceedings of the International Conf erence on Wireless Networks, June , 2003.
-
(2003)
Proceedings of the International Conf erence on Wireless Networks
-
-
Ramaswamy, S.1
Fu, H.2
Sreekantaradhya, M.3
Dixon, J.4
Nygard, K.5
-
20
-
-
47849102250
-
Security-Lifetime tradeoffs for Wireless Sensor networks
-
IEEE, pp, Sept
-
Z. Karakehayov, "Security-Lifetime tradeoffs for Wireless Sensor networks," Emerging Technologies & Factory Automation, ETFA, IEEE, pp. 246-250, Sept. , 2007
-
(2007)
Emerging Technologies & Factory Automation, ETFA
, pp. 246-250
-
-
Karakehayov, Z.1
|